[ 30.188556] audit: type=1800 audit(1543884033.530:27): pid=5972 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 30.226518] audit: type=1800 audit(1543884033.620:28): pid=5972 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 30.982047] audit: type=1800 audit(1543884034.380:29): pid=5972 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 31.009224] audit: type=1800 audit(1543884034.380:30): pid=5972 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.39' (ECDSA) to the list of known hosts. 2018/12/04 00:40:41 fuzzer started 2018/12/04 00:40:44 dialing manager at 10.128.0.26:42635 2018/12/04 00:40:44 syscalls: 1 2018/12/04 00:40:44 code coverage: enabled 2018/12/04 00:40:44 comparison tracing: enabled 2018/12/04 00:40:44 setuid sandbox: enabled 2018/12/04 00:40:44 namespace sandbox: enabled 2018/12/04 00:40:44 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/04 00:40:44 fault injection: enabled 2018/12/04 00:40:44 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/04 00:40:44 net packet injection: enabled 2018/12/04 00:40:44 net device setup: enabled 00:43:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x4, 0x7f, 0x9, 0x3, 0x0, 0x7, 0x400, 0x0, 0x0, 0x0, 0x0, 0x100, 0x40, 0x1, 0x4000000000000000, 0x101, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x7, 0x101, 0x4, 0x1, 0x8001, 0x8, 0x0, 0x7fff, 0x100, 0x8001, 0x40, 0x1ff, 0x0, 0x4, 0x0, 0xa445, 0x4, @perf_config_ext={0x5}, 0x0, 0xffffffff00000000, 0x79adb78a, 0x9, 0x0, 0x101, 0x200}, r1, 0x10, r0, 0x8) perf_event_open(&(0x7f0000001380)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x4) syzkaller login: [ 234.241416] IPVS: ftp: loaded support on port[0] = 21 00:43:57 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r0, 0xa, 0x2}, 0xf) [ 234.532739] IPVS: ftp: loaded support on port[0] = 21 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001380)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 234.901547] IPVS: ftp: loaded support on port[0] = 21 00:43:58 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)="2e2f6367726f757000aefc2797d9429a3a11a177b119dc5a645fa290bae10187a1c75a9bbdbaffae303e57ea11ba1c250d1430e551dcdc73de381b34de9c25e85b4971b732529a19d379cc39a149220ff2fc73075cb6bd207547db01dbc2efc7ca5f5b916d388ddfd517cc79a61556b141dfb52a10107e6bc01e405081c69b102b82d4fd1807f6c277698d3cfe99637bb19fcf26", 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0xa, 0x1, 0x0, &(0x7f0000000000), 0x8e}, 0x20) [ 235.309687] IPVS: ftp: loaded support on port[0] = 21 [ 235.595801] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.608191] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.624768] device bridge_slave_0 entered promiscuous mode 00:43:59 executing program 4: socket$kcm(0x2, 0x0, 0x2) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f00000004c0)=""/50) write$cgroup_type(r2, &(0x7f0000001900)="746888646164656400", 0xfdef) socketpair$inet6_tcp(0xa, 0x1, 0x0, 0x0) [ 235.796351] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.821214] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.851145] device bridge_slave_1 entered promiscuous mode [ 236.000128] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 236.083217] IPVS: ftp: loaded support on port[0] = 21 [ 236.145844] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 00:43:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdd8, 0x20000004, &(0x7f000031e000), 0x1c) [ 236.510911] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.526448] IPVS: ftp: loaded support on port[0] = 21 [ 236.551386] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.571157] device bridge_slave_0 entered promiscuous mode [ 236.688058] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.733556] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.739920] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.769128] device bridge_slave_1 entered promiscuous mode [ 236.836662] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.910316] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 236.988459] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.001199] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.008582] device bridge_slave_0 entered promiscuous mode [ 237.031027] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 237.131524] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.154290] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.164400] device bridge_slave_1 entered promiscuous mode [ 237.182844] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 237.197255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.358359] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 237.477509] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 237.503651] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 237.576050] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 237.637788] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.651322] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.671340] device bridge_slave_0 entered promiscuous mode [ 237.712919] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 237.720589] team0: Port device team_slave_0 added [ 237.782580] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.791850] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.817358] device bridge_slave_1 entered promiscuous mode [ 237.877365] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 237.905120] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 237.927495] team0: Port device team_slave_1 added [ 237.953796] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 238.054589] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 238.087178] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.113477] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 238.196570] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 238.217012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.229380] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.262738] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 238.271610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.280382] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.293863] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.324420] device bridge_slave_0 entered promiscuous mode [ 238.358140] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 238.368051] team0: Port device team_slave_0 added [ 238.382141] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.391484] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 238.421562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.429551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.457840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.486073] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.495324] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.503143] device bridge_slave_1 entered promiscuous mode [ 238.511373] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 238.518763] team0: Port device team_slave_1 added [ 238.543592] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 238.568562] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 238.603665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.637825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.676033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 238.688042] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 238.701843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.723267] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.734260] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 238.811819] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.821460] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 238.919351] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.927286] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.937794] device bridge_slave_0 entered promiscuous mode [ 238.973745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.983072] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 238.990550] team0: Port device team_slave_0 added [ 239.024360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.041875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.062341] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 239.077942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.102481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.114574] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.120936] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.136568] device bridge_slave_1 entered promiscuous mode [ 239.161363] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 239.182192] team0: Port device team_slave_1 added [ 239.274606] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 239.285731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 239.302095] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 239.308936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.331794] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.397454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 239.425575] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 239.442582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.450540] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.482530] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 239.533474] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 239.540895] team0: Port device team_slave_0 added [ 239.572216] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 239.580045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.609699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.635647] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 239.651439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.675124] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 239.691959] team0: Port device team_slave_1 added [ 239.713503] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 239.721134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.738701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.826568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.893586] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 239.973996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.040643] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 240.083651] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 240.090780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.100096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.170918] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.177457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.184527] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.190903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.214892] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 240.224158] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 240.239296] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 240.249418] team0: Port device team_slave_0 added [ 240.256110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.313601] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 240.321626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.329573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.354237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 240.361816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.392798] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 240.406702] team0: Port device team_slave_1 added [ 240.530927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 240.564485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.574404] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.663223] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.669611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.676331] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.682756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.717759] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 240.733545] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 240.746871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.759331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.781637] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 240.803863] team0: Port device team_slave_0 added [ 240.864561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 240.904831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.915108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.967271] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 240.992814] team0: Port device team_slave_1 added [ 241.023464] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 241.035079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.053749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.084054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.104680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 241.152669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 241.159525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.182464] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.343927] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 241.350801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.361979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.404219] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.410617] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.417336] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.423746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.445030] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 241.480583] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 241.487933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.504526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.639099] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 241.651520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.670604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.829374] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.835825] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.842538] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.849365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.857782] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 242.101257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.108535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.581757] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.588152] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.594902] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.601323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.619771] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 243.070274] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.076706] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.083430] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.089849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.099592] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 243.138234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.171761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.618486] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.061783] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.145862] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 246.586346] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 246.663017] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 246.672202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.695307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.011016] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.037038] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 247.068125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.077634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.224242] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.408591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.520463] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 247.575838] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.849360] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.929666] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 247.992197] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 247.998370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.005843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.364180] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 248.409073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.453423] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 248.459589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.489605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.514574] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.833216] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 248.839385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.851761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.879880] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 248.962196] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.304185] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.348799] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 249.368248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.377734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.788437] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.182474] hrtimer: interrupt took 29394 ns 00:44:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgid(0x0) getpriority(0x2, r1) 00:44:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x1) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) accept$packet(r0, 0x0, &(0x7f0000000480)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rtc\x00', 0x0, 0x0) 00:44:14 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x920, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000240), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 250.709223] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 250.730326] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 251.195320] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:14 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x920, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000240), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 00:44:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x1) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) accept$packet(r0, 0x0, &(0x7f0000000480)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rtc\x00', 0x0, 0x0) [ 251.614974] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:15 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x920, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000240), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 00:44:15 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:restorecond_exec_t:s0\x00', 0x28, 0x1) 00:44:15 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"766c616e300900003c062ec6b48b87a4", 0x1000000803}) [ 252.457987] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 252.488075] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 252.877192] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:16 executing program 3: 00:44:17 executing program 4: 00:44:17 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 00:44:17 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x920, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000240), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 00:44:17 executing program 3: 00:44:17 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:17 executing program 5: 00:44:17 executing program 5: 00:44:17 executing program 3: 00:44:17 executing program 0: [ 254.090584] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:17 executing program 4: 00:44:17 executing program 5: 00:44:17 executing program 0: 00:44:17 executing program 3: 00:44:17 executing program 4: 00:44:17 executing program 1: 00:44:17 executing program 0: 00:44:18 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:18 executing program 5: 00:44:18 executing program 3: 00:44:18 executing program 4: 00:44:18 executing program 0: 00:44:18 executing program 1: 00:44:18 executing program 4: 00:44:18 executing program 5: 00:44:18 executing program 0: 00:44:18 executing program 1: 00:44:18 executing program 3: 00:44:18 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 255.040767] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 255.084667] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:44:18 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0ba, 0x4) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 00:44:18 executing program 1: sigaltstack(&(0x7f0000ffc000/0x3000)=nil, 0x0) 00:44:18 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@link_local, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @rand_addr, {[@ra={0x94, 0x6}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 00:44:18 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000)=0x7, 0x4) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 00:44:18 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 00:44:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='sched\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x51) 00:44:18 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) 00:44:18 executing program 3: clone(0x2902001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r0 = getpid() tkill(r0, 0x32) ptrace(0x10, r0) 00:44:18 executing program 0: r0 = socket(0x10, 0x100000003, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) 00:44:19 executing program 5: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) fsync(0xffffffffffffffff) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000001440)="03", 0x1}], 0x1) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) 00:44:19 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) [ 255.664200] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:19 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 00:44:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x2, 0x0, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) 00:44:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget$private(0x0, 0x4000, 0xfffffffffffffffd, &(0x7f0000ff9000/0x4000)=nil) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) 00:44:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000009, 0x31, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000100)="26d2", 0x2, 0x8804, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000040)="3383d503524e", 0x6, 0x0, 0x0, 0x0) 00:44:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, &(0x7f0000000180)) 00:44:19 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 256.116520] syz-executor1 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 00:44:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) 00:44:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/33, 0x21}], 0x1, 0x1) [ 256.210648] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:19 executing program 3: clone(0x2902001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r0 = getpid() tkill(r0, 0x32) ptrace(0x10, r0) 00:44:19 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000200)) 00:44:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x32d) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) syz_open_procfs(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:19 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x20102, 0x0) ppoll(&(0x7f0000000200)=[{r0, 0x2}], 0x1, 0x0, &(0x7f0000000280), 0x8) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f"], 0x1) 00:44:19 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 00:44:19 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 00:44:19 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, 0x0) r2 = dup2(r0, r0) ioctl$DRM_IOCTL_GET_CTX(r2, 0xc0086423, 0x0) 00:44:20 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup2(r0, r0) setsockopt$inet_group_source_req(r1, 0x0, 0x0, 0x0, 0x0) 00:44:20 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) [ 256.646419] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:20 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 00:44:20 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r1, 0x2, &(0x7f0000000340)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 00:44:20 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000140)) 00:44:20 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)) 00:44:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x200000004e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) recvmmsg(r1, &(0x7f0000005f40)=[{{&(0x7f0000002140)=@pppol2tpin6, 0x80, &(0x7f0000003700)=[{&(0x7f00000021c0)=""/215, 0xd7}, {&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/189, 0xbd}, {&(0x7f0000003440)=""/178, 0xb2}, {&(0x7f0000003500)=""/147, 0x93}, {&(0x7f00000035c0)=""/30, 0x1e}, {&(0x7f0000003600)=""/212, 0xd4}], 0x7, &(0x7f0000003780)=""/140, 0x8c, 0xd962}}, {{0x0, 0x0, &(0x7f0000004ec0)=[{0x0}], 0x1}}], 0x2, 0x20, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 00:44:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xd9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x10000) 00:44:20 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 00:44:20 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 00:44:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x9) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4008744b, 0x0) [ 257.324081] audit: type=1800 audit(1543884260.720:31): pid=7941 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16566 res=0 00:44:20 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000100)) [ 257.387812] audit: type=1804 audit(1543884260.720:32): pid=7941 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir930659235/syzkaller.cinZBt/19/file0" dev="sda1" ino=16566 res=1 00:44:20 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 00:44:20 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 257.465376] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:20 executing program 3: syz_emit_ethernet(0x1c, &(0x7f0000000000)={@broadcast, @remote, [{[], {0x8100, 0x81}}], {@llc={0x4, {@snap={0x0, 0x1, "8e", "2d89fd", 0x0, "e9fa"}}}}}, 0x0) 00:44:20 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 00:44:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000009400)=[{{0x0, 0x0, 0x0}, 0x7}], 0x1, 0x0, 0x0) 00:44:21 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 00:44:21 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000006c0)={'syz'}, &(0x7f0000000700)='F', 0x1, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x10010006) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$describe(0x6, r0, 0x0, 0x0) [ 257.849390] audit: type=1804 audit(1543884261.240:33): pid=7941 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir930659235/syzkaller.cinZBt/19/file0" dev="sda1" ino=16566 res=1 00:44:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_THP_DISABLE(0x29, 0x1) 00:44:21 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x214, 0x0) 00:44:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x8}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty=0xe0ffffff}}, 0x1c) 00:44:21 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 00:44:21 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) dup2(r0, r1) [ 257.922527] syz-executor0 (7941) used greatest stack depth: 14840 bytes left 00:44:21 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 00:44:21 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000040)="6e732f706964243e35daa87e5f666f725f6368696c6472496e0085dc7834fba3e53d22bf4f291a8d5ca00a067d2cb47d185000") 00:44:21 executing program 0: 00:44:21 executing program 0: 00:44:22 executing program 1: 00:44:22 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 00:44:22 executing program 5: 00:44:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r1 = socket(0x10, 0x3, 0x0) recvmsg(r1, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000900)=@getroute={0x14, 0x1a, 0x1c974209d04c2781}, 0x14}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00'}) 00:44:22 executing program 0: 00:44:22 executing program 5: 00:44:22 executing program 1: [ 258.664429] device lo entered promiscuous mode [ 258.737120] device lo left promiscuous mode [ 258.770236] device lo entered promiscuous mode [ 258.782272] device lo left promiscuous mode 00:44:22 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:22 executing program 0: 00:44:22 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 00:44:22 executing program 1: 00:44:22 executing program 5: 00:44:22 executing program 3: 00:44:22 executing program 5: 00:44:22 executing program 1: 00:44:22 executing program 0: 00:44:22 executing program 3: 00:44:22 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000100)) [ 259.017384] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:22 executing program 5: 00:44:22 executing program 0: 00:44:22 executing program 3: 00:44:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") 00:44:22 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000100)) 00:44:22 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:22 executing program 5: 00:44:22 executing program 0: 00:44:22 executing program 5: 00:44:22 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000100)) 00:44:22 executing program 3: 00:44:22 executing program 0: 00:44:22 executing program 1: [ 259.485766] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:22 executing program 5: 00:44:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000100)) 00:44:23 executing program 3: 00:44:23 executing program 0: 00:44:23 executing program 1: 00:44:23 executing program 5: 00:44:23 executing program 3: 00:44:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, 0x0) 00:44:23 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:23 executing program 0: 00:44:23 executing program 0: 00:44:23 executing program 5: 00:44:23 executing program 3: 00:44:23 executing program 1: 00:44:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, 0x0) [ 260.062933] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:23 executing program 1: 00:44:23 executing program 5: 00:44:23 executing program 3: 00:44:23 executing program 0: 00:44:23 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, 0x0) 00:44:23 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:23 executing program 4: 00:44:23 executing program 3: 00:44:23 executing program 5: 00:44:23 executing program 1: 00:44:23 executing program 0: 00:44:23 executing program 5: 00:44:23 executing program 0: 00:44:23 executing program 1: 00:44:23 executing program 3: 00:44:23 executing program 4: 00:44:24 executing program 3: 00:44:24 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:24 executing program 5: 00:44:24 executing program 0: 00:44:24 executing program 4: 00:44:24 executing program 1: 00:44:24 executing program 3: 00:44:24 executing program 4: 00:44:24 executing program 1: 00:44:24 executing program 5: 00:44:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') sendfile(r0, r1, 0x0, 0x800) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x1) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f00000000c0)=0x100) fgetxattr(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="9673ffe63e1f14de334c1127035b99ffffff00000000646a00"], 0x0, 0x0) pipe(&(0x7f0000000200)) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000180)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfab}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_init1(0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) sendto$inet(r2, &(0x7f0000000000)="1b", 0x1, 0x8000, 0x0, 0x0) close(r2) 00:44:24 executing program 0: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x1) [ 261.627044] syz-executor3 (8194): /proc/8194/oom_adj is deprecated, please use /proc/8194/oom_score_adj instead. [ 261.653795] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:25 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, 0xffffffffffffffff) 00:44:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r1, 0x800454d2, 0x70f000) 00:44:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw6\x00') read$FUSE(r0, 0x0, 0x0) 00:44:25 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'eql\x00'}) 00:44:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0x9}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x3, &(0x7f0000c91000)=ANY=[@ANYBLOB="850000002f00000027000000000022009500000000000000"], 0x0, 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, r1, 0x4}, 0x10) close(r0) 00:44:25 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f00000001c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB="1400000000000000010000002400000000000000"], 0x14}, 0x0) 00:44:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') pread64(r0, 0x0, 0x0, 0x0) 00:44:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x6) [ 262.025406] raw_sendmsg: syz-executor5 forgot to set AF_INET. Fix it! [ 262.054324] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/sockstat6\x00') pread64(r0, 0x0, 0x0, 0x0) 00:44:25 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000001100)=ANY=[@ANYBLOB="1e"], 0x1, 0x0) msgsnd(r0, &(0x7f0000001140)={0x1}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000080)={0x0, ""/4096}, 0xdc8, 0xfffffffffffffffb, 0x0) 00:44:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSBRK(r0, 0x5427) r1 = msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(r1, 0x0) msgctl$IPC_RMID(0x0, 0x0) 00:44:25 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x800000000006) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) 00:44:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:25 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x800000000006) r1 = dup2(r0, r0) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f00000001c0)=@buf) 00:44:25 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) [ 262.522557] device lo entered promiscuous mode 00:44:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000006) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) [ 262.548289] device lo left promiscuous mode 00:44:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="636c6561725f7265667300a04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8ed0500f073e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54de66186a0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581295b31beaeaffb76778a196ad93aa3d2d7a06720827") r1 = syz_open_procfs(0x0, &(0x7f0000000680)="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") sendfile(r0, r1, 0x0, 0x1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 00:44:26 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x100000000001, 0x0, &(0x7f0000048000), 0x0) 00:44:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') sendfile(r0, r0, 0x0, 0x800) 00:44:26 executing program 1: unshare(0x24020400) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='syscall\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/4096, 0xffffff7b}], 0x1, 0x0) 00:44:26 executing program 0: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 00:44:26 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x100000000001, 0x0, &(0x7f0000048000), 0x0) 00:44:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') sendfile(r0, r0, 0x0, 0x800) 00:44:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="4e8c2bf3ad126611632f415a4e363e25f4142bb89bb442a7e3b23257c96a922cb8bc70b2", 0x24) [ 263.164655] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:26 executing program 4: r0 = socket$inet6(0xa, 0x803, 0xd) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) [ 263.255032] device lo entered promiscuous mode [ 263.342031] device lo left promiscuous mode 00:44:27 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r0) 00:44:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000300), 0x0) 00:44:27 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 00:44:27 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42400) 00:44:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@fat=@fmask={'fmask'}}]}) 00:44:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:27 executing program 4: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) [ 263.801635] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xfdfdffff}) 00:44:27 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 263.889308] FAT-fs (loop0): bogus number of reserved sectors [ 263.947874] FAT-fs (loop0): Can't find a valid FAT filesystem [ 264.012474] device lo entered promiscuous mode [ 264.032007] device lo left promiscuous mode [ 264.050276] FAT-fs (loop0): bogus number of reserved sectors [ 264.069077] FAT-fs (loop0): Can't find a valid FAT filesystem 00:44:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00') pread64(r0, 0x0, 0x0, 0x0) 00:44:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000803}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 00:44:27 executing program 0: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000036c0)={0x1, &(0x7f0000003700)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000600)="80f17a0b8c8970cad4e7c2198c830f262255157995a738328a6ea456e2363942b6223ced8e1d157847f0c1b27a6f790486384b94faefd0dfba2444691133054cc3c8e8e0c3448446a3c2b9f6f110a48d3902d829438729dc7496c17992daebf777fcec616e2ab5ee4386fc35ddb3c5be77d95c0fffaf93cd81c953d311d52830de1d0e9e0df27d08c3fd370198119340781d16aafdfe831593becee6a47cb0fc059d70333ded95e2eb745ff068798a7f26f16839020454432ad0db8fad8c6f345d112e5a6324307d28", 0xc9}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001200)=""/147, 0x93}], 0x1}}], 0x1, 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) [ 264.411958] audit: type=1804 audit(1543884267.810:34): pid=8410 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir930659235/syzkaller.cinZBt/43/bus" dev="sda1" ino=16611 res=1 [ 264.490133] audit: type=1804 audit(1543884267.810:35): pid=8408 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir930659235/syzkaller.cinZBt/43/bus" dev="sda1" ino=16611 res=1 [ 264.556394] audit: type=1804 audit(1543884267.810:36): pid=8410 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir930659235/syzkaller.cinZBt/43/bus" dev="sda1" ino=16611 res=1 00:44:28 executing program 2: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:28 executing program 1: getresuid(0x0, 0x0, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000005000/0x2000)=nil) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 00:44:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 00:44:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000300), 0x0) 00:44:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:28 executing program 4: 00:44:28 executing program 4: [ 264.879609] device lo entered promiscuous mode [ 264.959142] device lo left promiscuous mode 00:44:28 executing program 4: 00:44:28 executing program 1: 00:44:28 executing program 4: 00:44:28 executing program 4: 00:44:28 executing program 1: [ 265.647027] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:29 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:29 executing program 4: 00:44:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 00:44:29 executing program 3: 00:44:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:29 executing program 1: [ 265.892389] device lo entered promiscuous mode 00:44:29 executing program 4: 00:44:29 executing program 1: 00:44:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/softnet_stat\x00') readv(r0, &(0x7f00000000c0)=[{&(0x7f0000001140)=""/233, 0xe9}], 0x1) 00:44:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) [ 266.028412] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:29 executing program 4: syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup2(r1, r0) write$nbd(r2, 0x0, 0x0) 00:44:29 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="240000000c0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 266.236859] netlink: 'syz-executor1': attribute type 1 has an invalid length. 00:44:30 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000002c0)=ANY=[]) 00:44:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x80000000006000) preadv(r0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000180)=""/108, 0x6c}, {&(0x7f0000000200)=""/180, 0xb4}], 0x3, 0x0) 00:44:30 executing program 0: mknod(&(0x7f0000000040)='./file0\x00', 0x800a, 0x0) clone(0x3102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) execve(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000000c0)={0x0, 0xffffffa0, &(0x7f0000000180)={0x0, 0xffffff67}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 00:44:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$unix(r1, &(0x7f0000000200)=@abs, 0x6e) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 00:44:30 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000002c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000400)=""/222, 0xde}, 0x0) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000007c0)={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000800)=r1) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000a40)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xc}}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000001e40)="c9", 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000bc0)="7792", 0x2}], 0x1}, 0x0) 00:44:30 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000080)={0xb, @raw_data="5ff57f7d4232d2468654268e14cc45a6cbe42712f266b9909e90ef6dc11914a6b3c501b372d6911f850f5f5f7716738e86536aecc74fac41d963398c3fb9e1e309975edc67ca76191839521dd1469186a200c8208a2fd6e37ffd4c921fda7e9893c2c1395db5a94dbe390ed27fd6d33740cbfb03ad61d2714cd816f85c575630a28d73cd554e2551ebd6a8bb7756d78dddf700e33692cb4464f3f3dc1da2f6a503bcf9a213e6e47d7ff1919a18de7f6ae137befca111b5a03a876cd44a6ddf3d9f01305a06ac8f0f"}) [ 266.820595] device lo left promiscuous mode 00:44:30 executing program 0: socket$kcm(0x29, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)="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", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc020660b, 0x730080) 00:44:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x803, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @broadcast}, 0x10) r2 = socket(0x100000010, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, 0x0, 0x0) 00:44:30 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="f95b2d023c926285718070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000), 0xc) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 00:44:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) [ 267.247962] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x80000000006000) preadv(r0, &(0x7f0000000440)=[{0x0}, {0x0, 0xfffffe43}, {&(0x7f0000000200)=""/180, 0xb4}], 0x3, 0x0) 00:44:30 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x20100, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='7:2\t'], 0x4) 00:44:30 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:30 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) tkill(r1, 0x8001004000000016) 00:44:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 267.535590] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 00:44:31 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)) 00:44:31 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x20100, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='7:2\t'], 0x4) 00:44:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000000)=@unspec, 0xc) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) [ 267.634751] syz-executor1 (8516) used greatest stack depth: 12320 bytes left [ 267.666912] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001a6, 0x7ffffffff000) socket$alg(0x26, 0x5, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(0xffffffffffffffff, 0x800455d1, &(0x7f00000000c0)) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb", 0x1}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz1\x00', 0x1ff) write$UHID_CREATE2(r1, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYPTR, @ANYRESOCT=r1], 0x3) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000001240)) getpgid(0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) lstat(&(0x7f00000008c0)='./file0/file0\x00', &(0x7f0000000d80)) 00:44:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_FD(r0, 0x4c02, 0xffffffffffffffff) 00:44:31 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:31 executing program 0: syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e2c99758422ef04129587966420fe2e33e0f1110c442019dccd3196f") semctl$GETVAL(0x0, 0x0, 0xc, 0x0) [ 267.952413] FAT-fs (loop1): bogus number of reserved sectors 00:44:31 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:31 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) [ 268.037875] FAT-fs (loop1): Can't find a valid FAT filesystem [ 268.243611] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:33 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x2, 0x2, 0xcf, &(0x7f0000000000)) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[@ANYBLOB='-1'], 0x2) 00:44:33 executing program 3: pselect6(0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) 00:44:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r1 = getpid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) 00:44:33 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001a6, 0x7ffffffff000) socket$alg(0x26, 0x5, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(0xffffffffffffffff, 0x800455d1, &(0x7f00000000c0)) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000001680)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000dfff, 0x1, &(0x7f0000000040)=[{&(0x7f00000016c0)="eb", 0x1}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000600)='syz1\x00', 0x1ff) write$UHID_CREATE2(r1, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYPTR, @ANYRESOCT=r1], 0x3) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000001240)) getpgid(0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) lstat(&(0x7f00000008c0)='./file0/file0\x00', &(0x7f0000000d80)) 00:44:33 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) [ 269.827215] FAT-fs (loop1): bogus number of reserved sectors [ 269.887083] FAT-fs (loop1): Can't find a valid FAT filesystem [ 269.898417] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:33 executing program 4: 00:44:33 executing program 1: 00:44:33 executing program 4: 00:44:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:33 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r1 = getpid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) [ 270.378304] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:33 executing program 3: 00:44:33 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r1 = getpid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) 00:44:33 executing program 4: 00:44:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:33 executing program 0: 00:44:33 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:34 executing program 4: 00:44:34 executing program 0: 00:44:34 executing program 3: 00:44:34 executing program 4: 00:44:34 executing program 0: 00:44:34 executing program 3: [ 270.752753] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:34 executing program 4: 00:44:34 executing program 1: 00:44:34 executing program 4: 00:44:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:34 executing program 3: 00:44:34 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:34 executing program 0: 00:44:34 executing program 1: 00:44:34 executing program 4: 00:44:34 executing program 3: 00:44:34 executing program 1: 00:44:34 executing program 0: 00:44:34 executing program 4: 00:44:34 executing program 3: 00:44:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:34 executing program 0: 00:44:34 executing program 1: [ 271.329497] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:35 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:35 executing program 4: 00:44:35 executing program 3: 00:44:35 executing program 0: 00:44:35 executing program 1: 00:44:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:35 executing program 4: 00:44:35 executing program 0: 00:44:35 executing program 1: 00:44:35 executing program 3: 00:44:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00'}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:35 executing program 4: [ 271.785075] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:35 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:35 executing program 1: 00:44:35 executing program 0: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00), &(0x7f0000048000), 0x0) 00:44:35 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)) 00:44:35 executing program 4: syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) 00:44:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00'}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:35 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() get_robust_list(r1, &(0x7f0000000100)=0x0, &(0x7f0000000140)) 00:44:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00'}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:35 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20101, 0x0) writev(r0, &(0x7f0000002500)=[{&(0x7f0000000240)="01", 0x1}], 0x1) 00:44:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000680)='net/ip6_tables_targets\x00') pread64(r0, 0x0, 0x0, 0x400000) [ 272.224768] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000009fc8)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x1c, 0x1a, 0x100000401, 0x0, 0x0, {0x4000a}, [@typed={0x8, 0x19, @ipv4=@remote}]}, 0x1c}}, 0x0) 00:44:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpriority(0x0, 0x0) 00:44:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:35 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r2, 0x6) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, 0x0, 0x0) r3 = socket$inet(0x10, 0x3, 0x4) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f00000001c0)="4c0000001200ff09fffefdb724a6006100000900000000000000150006001d001fc41180b598be593ab6821148a720bb1aa49868c62b2ca654a6613b6aabf35d0f1cbc882b079881e566f245", 0x4c}], 0x1}, 0x0) [ 272.595889] device lo entered promiscuous mode [ 272.611296] device lo left promiscuous mode 00:44:36 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/33, 0x21}, {0x0}], 0x2, 0x1) 00:44:36 executing program 4: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_TSC(0x1a, 0x1) 00:44:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/33, 0x21}, {&(0x7f0000001140)=""/107, 0x6b}, {&(0x7f0000000240)=""/73, 0x49}], 0x3, 0x0) 00:44:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$evdev(r0, 0x0, 0x0) execve(0x0, 0x0, 0x0) [ 272.984012] device lo entered promiscuous mode 00:44:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigsuspend(&(0x7f0000000000)={0x46b}, 0x8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000080000000) [ 273.012680] device lo left promiscuous mode 00:44:36 executing program 1: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400000000006008, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={[], 0x0, 0x8, 0xac6c}) 00:44:36 executing program 1: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400000000006008, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={[], 0x0, 0x8, 0xac6c}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:44:36 executing program 1: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2}, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) sendfile(r0, r0, 0x0, 0x100000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001fa) [ 273.397796] audit: type=1800 audit(1543884276.790:37): pid=8873 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16713 res=0 [ 273.446355] audit: type=1804 audit(1543884276.810:38): pid=8873 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir302941645/syzkaller.WGqriK/64/file0" dev="sda1" ino=16713 res=1 [ 273.484282] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x1}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x8000000000044000) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') sendfile(r0, r0, 0x0, 0x800) 00:44:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) [ 273.674846] device lo entered promiscuous mode [ 273.699021] device lo left promiscuous mode 00:44:37 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) [ 274.047029] audit: type=1804 audit(1543884277.440:39): pid=8873 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir302941645/syzkaller.WGqriK/64/file0" dev="sda1" ino=16713 res=1 [ 274.186130] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:40 executing program 3: 00:44:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x1}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x8000000000044000) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') sendfile(r0, r0, 0x0, 0x800) 00:44:40 executing program 0: 00:44:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:40 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:40 executing program 1: 00:44:40 executing program 3: 00:44:40 executing program 1: [ 276.694927] device lo entered promiscuous mode 00:44:40 executing program 0: 00:44:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lremovexattr(0x0, 0x0) 00:44:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00') pread64(r0, &(0x7f0000000480)=""/4096, 0x1000, 0x0) 00:44:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) [ 276.784113] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:40 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:44:40 executing program 0: unshare(0x24020400) mknod(&(0x7f0000000080)='./file0\x00', 0x1038, 0x0) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='syscall\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/4096, 0xffffff7b}], 0x1, 0x0) pread64(r0, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x405, 0x0) 00:44:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000400)='keyring&^\x00', 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) 00:44:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:40 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) exit(0x0) 00:44:40 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:40 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f00000007c0)=[{0x0}, {&(0x7f00000002c0)=""/151, 0x97}, {&(0x7f0000000380)=""/124, 0x7c}], 0x3) 00:44:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) 00:44:40 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x14, 0x0, &(0x7f00000018c0)=[@dead_binder_done={0x40086310, 0x4}, @acquire={0x400c630e}], 0x0, 0x0, &(0x7f0000001900)}) 00:44:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) [ 277.275846] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) [ 277.375284] device lo entered promiscuous mode [ 277.384403] binder: 8973:8975 BC_DEAD_BINDER_DONE 0000000000000004 not found [ 277.431776] binder: 8973:8975 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 00:44:41 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x100000000001, 0x0, &(0x7f0000048000), 0x0) 00:44:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:44:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 00:44:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x0, 0x1, [@dev]}, 0x14) 00:44:41 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000000)=""/49) 00:44:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 277.766510] device lo left promiscuous mode 00:44:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x3, @dev, 0x8}, 0x1c) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r0, 0x0) 00:44:41 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffbfffffffffffa}, 0x0, 0x8) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x7, 0x4, @tid=r0}, &(0x7f0000000080)) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) r2 = epoll_create1(0x0) epoll_pwait(r2, &(0x7f00000002c0)=[{}], 0x1, 0xffffffffffffffff, &(0x7f00000000c0), 0x8) 00:44:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000140)=0x66) read(r0, &(0x7f0000000040)=""/11, 0xfffffcfb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0xb05}) ioctl$TCXONC(r1, 0x540a, 0x0) 00:44:41 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setscheduler(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001380)=[{{&(0x7f00000012c0)=@nfc_llcp, 0x80, &(0x7f0000001340)=[{&(0x7f0000002540)=""/4096, 0x1000}], 0x1b5, &(0x7f00000010c0)=""/164, 0xa4}, 0x3}], 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002500), 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') pwritev(r1, &(0x7f0000000180), 0x3c7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 278.116004] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:41 executing program 0: 00:44:41 executing program 4: 00:44:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x0) 00:44:41 executing program 1: 00:44:41 executing program 0: 00:44:41 executing program 1: [ 278.366960] device lo entered promiscuous mode 00:44:41 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:41 executing program 4: 00:44:41 executing program 3: [ 278.421928] device lo left promiscuous mode 00:44:41 executing program 0: 00:44:41 executing program 1: 00:44:41 executing program 3: 00:44:42 executing program 0: 00:44:42 executing program 4: 00:44:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback}, 0x10) 00:44:42 executing program 1: 00:44:42 executing program 4: 00:44:42 executing program 3: [ 278.937584] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 279.016499] device lo entered promiscuous mode [ 279.025276] device lo left promiscuous mode 00:44:42 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:42 executing program 0: 00:44:42 executing program 3: 00:44:42 executing program 1: 00:44:42 executing program 4: 00:44:42 executing program 0: 00:44:42 executing program 4: 00:44:42 executing program 3: 00:44:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback}, 0x10) 00:44:42 executing program 1: 00:44:42 executing program 4: 00:44:42 executing program 3: [ 279.575769] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:43 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, 0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:43 executing program 0: 00:44:43 executing program 3: 00:44:43 executing program 1: 00:44:43 executing program 4: [ 279.688334] device lo entered promiscuous mode [ 279.694684] device lo left promiscuous mode 00:44:43 executing program 4: 00:44:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) 00:44:43 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000080)) 00:44:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @remote, @remote}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback}, 0x10) 00:44:43 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 00:44:43 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000680)="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") pread64(r1, 0x0, 0x0, 0x0) 00:44:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000680)="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") pread64(r0, 0x0, 0x0, 0x0) [ 280.194289] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 280.539584] device lo entered promiscuous mode [ 280.548557] device lo left promiscuous mode 00:44:44 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:44 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000080)) 00:44:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = mq_open(&(0x7f0000000240)="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", 0x42, 0x0, 0x0) close(r1) mq_unlink(&(0x7f0000000440)="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") 00:44:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x30) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@ipv4={[], [], @multicast1}, @dev, @mcast1, 0x0, 0x0, 0x0, 0xfe}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r2, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 00:44:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) 00:44:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x8, 0x800000000004, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040), 0x0, 0x100020000}, 0x20) 00:44:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$inet6(0xa, 0x3, 0x7, 0x0) 00:44:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) 00:44:44 executing program 4: r0 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 00:44:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) sendto$inet(r0, &(0x7f0000000040)="91", 0x1, 0x0, 0x0, 0x0) 00:44:44 executing program 0: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f00000000c0)=0x182, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:44:44 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'veth0_to_bridge\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000bc0)="2f67726f7574002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac752a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1c0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98ace3574511e0c61f722ff61f1db073657764c13f23ed76e9f5ad9b0a121d3019202a82a3e997831b6e1e10f53b98ab1eb37dc61e5717d51a0369715e1e92e66a6b80c82805f9df4f8a02c23d874f64ae00", 0x2761, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x16}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000680)="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") bpf$PROG_LOAD(0x5, &(0x7f0000007540)={0x0, 0xa, &(0x7f00000005c0)=ANY=[@ANYBLOB="25140c005400051e98e47d279cb8aff9d28ca4cef0710000005bdf9007d87b86000000000000003752000076f09a000000000097808ff2c8c5a478ac991eca7297fe52e6f6c2ff16421ffe8c83ab7599e0"], 0x0, 0x4, 0x0, 0x0, 0x41100, 0x1}, 0x48) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000b00)}, 0x0) recvmsg$kcm(r0, &(0x7f0000002b00)={&(0x7f00000002c0)=@sco, 0x80, &(0x7f0000002940)=[{&(0x7f00000003c0)=""/200, 0xc8}, {&(0x7f0000000900)=""/194, 0xc2}, {&(0x7f00000015c0)=""/197, 0xc5}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/215, 0xd7}], 0x5, 0x0, 0x0, 0x3}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0xa, 0x2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) 00:44:45 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) dup2(r0, r1) 00:44:45 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000003c80)={&(0x7f0000003900)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "5f4235185d16fa4c040de3a25b2a22e1e8c49580780c6f3998250c95fb0e427600da9b1a039cd3ba71b2660d9c650b80eeb3b9132df9ebd74bd4291acacc2c"}, 0x80, 0x0, 0x0, &(0x7f0000003a00)=[{0x10}], 0x10, 0x4}, 0x1) 00:44:45 executing program 3: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) recvmsg(r0, &(0x7f0000002880)={0x0, 0x0, &(0x7f0000002740)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300000000000000000000", 0x23}], 0x1}, 0x0) 00:44:45 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'veth0_to_bridge\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000bc0)="2f67726f7574002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac752a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1c0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98ace3574511e0c61f722ff61f1db073657764c13f23ed76e9f5ad9b0a121d3019202a82a3e997831b6e1e10f53b98ab1eb37dc61e5717d51a0369715e1e92e66a6b80c82805f9df4f8a02c23d874f64ae00", 0x2761, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x16}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000680)="6c6f00966f380f64a1e3d75d627d1fa159ad34909d60d298034e00202759175d1563ca52dd984f43891be784e2058077d27c448d4b144278cb7548c2ee63bf3c3e591afc1f394f4281891836c571406eb4b673b00000fc0000080000daefec45ecd549b29bfe8d903f00e9e47e673ac1b2616a96bba7e2c0dcf95108eb167f5411d30d37e62266cf8eab640f747082aed2158e2b63f6bfe1343ea62da563ded7abea1ff873329c5646d518fe0e8f20010000792efc2a82a5a17035c87bf7efabe899eb77238a741c80fcb095a2a7d72c595d45388358f546dc882df5b0b55edb1ab6aa14e2b90d685e4a2dd1ba556e04276c1be06fdbc891251cb5bfb690b4c27f5d2fb3e7c92794cf496fdf0495b506841f483edac504209488eb27d43b367fd9992d1b7c478dd4b925aa51a04b100393e1cce76d8027f0a5ed280da80f26b1f3ff300c82255f928b44b9d9e7f2e4c16923dc8741b9c70d92fa1111b51f039ddd1b6adfac67e3a053d38ae16e97eaf5a0270be9a0f12066aa6ecfb569b664bc920bd5381608b35f3aa4210a79c4260a574d4da8c40b9f016ff4ab26b6170250c3214ea18622d704f1c021edffee24c8398c4230d16444e0495088a2f2599a662424f18196f750acca803a21b49423cb5e9f2703e393b982bfcfc4e3f7034f68f272ca8f66bb2f9f2aaf1a20a5a03f254da58698fa342731c70c3ccc40e88aac2edee4c7f59c6ba43021e91424b3056db56ded0c7493d8a3802759b905bb747cbebc7a0af3f570f89f7e1bd00b1c51") bpf$PROG_LOAD(0x5, &(0x7f0000007540)={0x0, 0xa, &(0x7f00000005c0)=ANY=[@ANYBLOB="25140c005400051e98e47d279cb8aff9d28ca4cef0710000005bdf9007d87b86000000000000003752000076f09a000000000097808ff2c8c5a478ac991eca7297fe52e6f6c2ff16421ffe8c83ab7599e0"], 0x0, 0x4, 0x0, 0x0, 0x41100, 0x1}, 0x48) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000b00)}, 0x0) recvmsg$kcm(r0, &(0x7f0000002b00)={&(0x7f00000002c0)=@sco, 0x80, &(0x7f0000002940)=[{&(0x7f00000003c0)=""/200, 0xc8}, {&(0x7f0000000900)=""/194, 0xc2}, {&(0x7f00000015c0)=""/197, 0xc5}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/215, 0xd7}], 0x5, 0x0, 0x0, 0x3}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0xa, 0x2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) 00:44:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x0, 0x7, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}) 00:44:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0x8}) pwritev(r0, &(0x7f0000000700)=[{&(0x7f0000000680), 0xffffff04}], 0x10000000000001c0, 0x0) pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="f2", 0x1}], 0x1, 0x0) 00:44:45 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast1=0xe000fc00}, @icmp=@address_request}}}}, 0x0) 00:44:45 executing program 5: syz_emit_ethernet(0x7e, &(0x7f0000000000)={@empty, @remote, [{}], {@ipv6={0x86dd, {0x0, 0x6, "1c9f90", 0x44, 0x0, 0x0, @dev, @ipv4={[], [], @multicast1}, {[], @gre}}}}}, 0x0) 00:44:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) write$binfmt_elf32(r0, &(0x7f0000000b00)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "8e519901d693e390c2849a060014901a84289395a7196030fff7de511ccc5ca7c28e06a93d17547dca88fcb8a976ea0a02af6313836d11f153dbdce844c037d1e369823e4f636d2df139a6c59c22a869e8bd3f509f64fece575ec56bc4c27ff2332b4bacd980500a913659920c86fb44a5"}, 0xc9) sendto(r0, &(0x7f0000000340)="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", 0x721, 0x0, 0x0, 0x0) 00:44:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) write$binfmt_elf32(r0, &(0x7f0000000b00)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}], "8e519901d693e390c2849a060014901a84289395a7196030fff7de511ccc5ca7c28e06a93d17547dca88fcb8a976ea0a02af6313836d11f153dbdce844c037d1e369823e4f636d2df139a6c59c22a869e8bd3f509f64fece575ec56bc4c27ff2332b4bacd980500a913659920c86fb44a588644724717c6e94d989cb0e8a1c82036a631c34202b7ea03c4969f3374295"}, 0xe8) sendto(r0, &(0x7f0000000340)="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", 0x6ef, 0x0, 0x0, 0x0) 00:44:45 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) dup2(r0, r1) 00:44:45 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='yeah\x00', 0x5) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x8408) 00:44:45 executing program 5: 00:44:45 executing program 0: 00:44:45 executing program 5: 00:44:45 executing program 3: 00:44:45 executing program 0: 00:44:46 executing program 1: 00:44:46 executing program 5: 00:44:46 executing program 4: 00:44:46 executing program 3: 00:44:46 executing program 0: 00:44:46 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) dup2(r0, r1) 00:44:46 executing program 3: 00:44:46 executing program 4: 00:44:46 executing program 5: 00:44:46 executing program 0: 00:44:46 executing program 1: 00:44:46 executing program 0: 00:44:46 executing program 5: 00:44:46 executing program 4: 00:44:46 executing program 3: 00:44:46 executing program 1: 00:44:46 executing program 5: 00:44:47 executing program 4: 00:44:47 executing program 0: 00:44:47 executing program 3: 00:44:47 executing program 1: 00:44:47 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:47 executing program 5: 00:44:47 executing program 5: 00:44:47 executing program 1: 00:44:47 executing program 0: 00:44:47 executing program 3: 00:44:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)={[{@utf8no='utf8=0'}, {@numtail='nonumtail=0'}]}) 00:44:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) close(r1) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000080)=""/232) ioctl$EVIOCGREP(r1, 0x80084503, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000280)) 00:44:47 executing program 1: prctl$PR_GET_FP_MODE(0x2e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{}, {}, 0x0, {0x2, 0x0, @dev}}) 00:44:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)) 00:44:47 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, &(0x7f0000000100)={0xbe2}, 0x8) 00:44:47 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') 00:44:48 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:44:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x7) 00:44:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) close(r1) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000080)=""/232) ioctl$EVIOCGREP(r1, 0x80084503, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000280)) 00:44:48 executing program 4: creat(&(0x7f0000000040)='./bus\x00', 0x80) fchdir(0xffffffffffffffff) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) socket$inet6(0xa, 0x1000000000004, 0xfffb) exit(0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='security.ima\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0x0) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x8, 0x2, 0x89, 0x3, 0xca, 0xca30}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x3, 0x0, 0x80000000, 0x80, 0x4}, 0xc) 00:44:48 executing program 1: prctl$PR_GET_FP_MODE(0x2e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{}, {}, 0x0, {0x2, 0x0, @dev}}) 00:44:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@utf8='utf8=1'}, {@uni_xlate='uni_xlate=1'}]}) 00:44:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x3, 0x0, 0x80000000, 0x80, 0x4}, 0xc) [ 285.214810] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) [ 285.238982] FAT-fs (loop5): bogus number of reserved sectors [ 285.257127] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 285.257691] FAT-fs (loop5): Can't find a valid FAT filesystem 00:44:48 executing program 1: prctl$PR_GET_FP_MODE(0x2e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{}, {}, 0x0, {0x2, 0x0, @dev}}) [ 285.341046] FAT-fs (loop5): bogus number of reserved sectors [ 285.347626] FAT-fs (loop5): Can't find a valid FAT filesystem 00:44:48 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) 00:44:48 executing program 3: syz_open_procfs(0x0, &(0x7f00000002c0)='net/psched\x00') 00:44:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) 00:44:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x0, 0x0, 0x0) 00:44:49 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001180)=""/2, 0x2}, {&(0x7f00000011c0)=""/155, 0x9b}], 0x3, 0x0) 00:44:49 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) dup2(r0, r1) 00:44:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) 00:44:49 executing program 4: creat(&(0x7f0000000040)='./bus\x00', 0x80) fchdir(0xffffffffffffffff) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) socket$inet6(0xa, 0x1000000000004, 0xfffb) exit(0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=@known='security.ima\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0x0) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x8, 0x2, 0x89, 0x3, 0xca, 0xca30}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x3, 0x0, 0x80000000, 0x80, 0x4}, 0xc) 00:44:49 executing program 1: prctl$PR_GET_FP_MODE(0x2e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{}, {}, 0x0, {0x2, 0x0, @dev}}) 00:44:49 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)="2f02726f0500000074617000895059372f9199aa53f0bb5cf7b64cb7336b650264b1f1f81db62cc9399668f301b3668ad02b47dd439dcf453f1bceff3b4f5a2745f5", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000000) 00:44:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x3, &(0x7f0000000200)=""/143, 0x8f) 00:44:49 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, &(0x7f00000000c0)) 00:44:49 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x402) write$P9_RRENAME(r0, &(0x7f0000000100)={0x7}, 0x7) 00:44:49 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000)=0x2f, 0x4) 00:44:49 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x2, &(0x7f0000000980)) 00:44:49 executing program 0: 00:44:49 executing program 1: prctl$PR_GET_FP_MODE(0x2e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:50 executing program 2: syz_open_procfs(0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r0) 00:44:50 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @broadcast}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'team0\x00'}) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) listxattr(0x0, &(0x7f00000013c0)=""/21, 0x15) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 00:44:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, 0x0) 00:44:50 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 00:44:50 executing program 1: prctl$PR_GET_FP_MODE(0x2e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:50 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080)=0x40, 0x4) 00:44:50 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f00000000c0)=0xffffff2a) 00:44:50 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) io_setup(0x7d78, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000001740)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 00:44:50 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000040), 0xc) [ 287.222606] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:50 executing program 0: 00:44:50 executing program 0: 00:44:50 executing program 0: 00:44:51 executing program 2: syz_open_procfs(0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r0) 00:44:51 executing program 4: 00:44:51 executing program 5: 00:44:51 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @broadcast}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'team0\x00'}) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) listxattr(0x0, &(0x7f00000013c0)=""/21, 0x15) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) [ 287.756000] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:51 executing program 1: prctl$PR_GET_FP_MODE(0x2e) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:51 executing program 0: 00:44:51 executing program 5: 00:44:51 executing program 4: 00:44:51 executing program 5: 00:44:51 executing program 3: 00:44:51 executing program 4: 00:44:51 executing program 2: syz_open_procfs(0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r0) 00:44:51 executing program 0: 00:44:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:51 executing program 3: 00:44:51 executing program 4: 00:44:51 executing program 5: [ 288.176201] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:51 executing program 0: 00:44:51 executing program 3: 00:44:51 executing program 5: 00:44:51 executing program 4: 00:44:51 executing program 0: 00:44:51 executing program 3: 00:44:52 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, 0xffffffffffffffff) 00:44:52 executing program 0: 00:44:52 executing program 4: 00:44:52 executing program 3: 00:44:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:52 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, 0x0) 00:44:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 00:44:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000803}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'bridge_slave_1\x00'}) 00:44:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 00:44:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000800)={'syz0\x00'}, 0x45c) [ 288.757405] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:52 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, 0xffffffffffffffff) 00:44:52 executing program 4: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 00:44:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xf5) ioctl(r0, 0x1000008912, &(0x7f00000046c0)="0a5c2d023c126285718070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r2}, {r1, 0x300}], 0x2, 0x0, 0x0, 0x0) 00:44:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000803}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 00:44:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpriority(0x1, 0x0) 00:44:52 executing program 0: syz_mount_image$hfsplus(&(0x7f00000003c0)='hfsplus\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@force='force'}], [{@subj_role={'subj_role', 0x3d, 'C'}}]}) 00:44:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000300)) 00:44:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a7c2d023c126285718070") clock_gettime(0x0, &(0x7f0000000040)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r1}) 00:44:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) [ 289.174793] hfsplus: unable to parse mount options [ 289.189675] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 289.220752] hfsplus: unable to parse mount options 00:44:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) waitid(0x0, 0x0, 0x0, 0x0, 0x0) 00:44:52 executing program 4: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) sendto$inet6(r0, 0x0, 0xffffff96, 0xffbffffffffffffd, &(0x7f0000000080)={0xa, 0x4e24}, 0x1c) 00:44:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_settime(0x0, &(0x7f0000000040)) 00:44:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_settime(0x2, 0x0) 00:44:52 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) 00:44:52 executing program 2: syz_open_procfs(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, 0xffffffffffffffff) 00:44:52 executing program 3: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400000000006008, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x20, 0x0, 0x5) 00:44:52 executing program 3: add_key$keyring(0x0, &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) 00:44:52 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400000040006008, 0x1) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fsync(r0) 00:44:52 executing program 5: getresuid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000042c0)) 00:44:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) [ 289.815808] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:52 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000180)=0x7, 0x4) 00:44:52 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 00:44:53 executing program 3: add_key$keyring(0x0, &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) 00:44:53 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = dup2(r0, r0) ioctl$UI_SET_PHYS(r1, 0x4008556c, 0x0) 00:44:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:53 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x400000, 0x0) sched_getscheduler(r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = socket(0x840000000002, 0x3, 0xff) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) poll(&(0x7f0000000140)=[{r2}, {r2, 0x100}, {r4, 0x400}, {}, {r2, 0xc}, {r2}, {r4, 0x2000}], 0x7, 0x2) syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r5 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) sched_setscheduler(r5, 0x5, &(0x7f0000000200)) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000280)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000180)={0x14, 0xd, 0xb, 0x3, 0x9, 0x9ef, 0x5, 0x0, 0x1}) 00:44:53 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x7}, 0xe) 00:44:53 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x100) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400000000006008, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000002c0)) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x7fffffff, 0x80000) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000200)={0x28, 0x2, 0x0, {0x2, 0x80000001, 0x4}}, 0x28) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$BLKROSET(r3, 0x125d, &(0x7f0000000100)) sendto$unix(r3, &(0x7f0000000300)="e3de4aa62d90cd0a7cb16f2427962dad31ee445328ffff504b03d6e78882c947950f44086b305e166cc95926c98cdc5a5f439176fcf5855499c02597c5ed69ae6f0486b61fc771f316a8faedec9e1bf3e85936ebe3ab21b0c7d73836f8535ce36a0f209d2f121a35dcc7533de939752581e5137e7f5e6cce7db977ff6579728b79d8ee7d0e8b1591653921d6b9e62a260d187274", 0x94, 0x0, 0x0, 0x0) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) r4 = getpid() ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000140)={[], 0x1, 0x8000, 0xddf, 0x101, 0xffffffffffffffff, r4}) 00:44:53 executing program 4: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000880)='/dev/urandom\x00', 0x20000002200, 0x0) dup2(r0, r1) 00:44:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8932, &(0x7f0000000040)={'bond_slave_0\x00'}) 00:44:53 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x400000, 0x0) sched_getscheduler(r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = socket(0x840000000002, 0x3, 0xff) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) poll(&(0x7f0000000140)=[{r2}, {r2, 0x100}, {r4, 0x400}, {}, {r2, 0xc}, {r2}, {r4, 0x2000}], 0x7, 0x2) syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r5 = getpid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) sched_setscheduler(r5, 0x5, &(0x7f0000000200)) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000280)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000180)={0x14, 0xd, 0xb, 0x3, 0x9, 0x9ef, 0x5, 0x0, 0x1}) 00:44:53 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000003c0)=0x18) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r1, &(0x7f0000000440)="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", 0x0, 0x2}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000040), 0x0}, 0x20) 00:44:53 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r1, &(0x7f0000000440)="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", 0x0, 0x2}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000)='@', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000440), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000040), 0x0}, 0x20) [ 290.804591] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8943, &(0x7f0000000040)={'bond_slave_0\x00'}) [ 290.935863] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="636c6561725f7265667300a04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8ed0500f073e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54de66186a0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581295b31beaeaffb76778a196ad93aa3d2d7a06720827") r1 = syz_open_procfs(0x0, &(0x7f0000000680)="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") sendfile(r0, r1, 0x0, 0x1) preadv(r1, 0x0, 0x0, 0x0) 00:44:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="636c6561725f7265667300a04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8ed0500f073e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54de66186a0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581295b31beaeaffb76778a196ad93aa3d2d7a06720827") r1 = syz_open_procfs(0x0, &(0x7f0000000680)="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") sendfile(r0, r1, 0x0, 0x1) sysfs$2(0x2, 0x0, 0x0) 00:44:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:54 executing program 4: 00:44:54 executing program 3: 00:44:54 executing program 5: 00:44:54 executing program 0: 00:44:54 executing program 2: 00:44:54 executing program 5: 00:44:54 executing program 4: 00:44:54 executing program 0: 00:44:54 executing program 3: 00:44:54 executing program 2: 00:44:54 executing program 5: 00:44:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:54 executing program 0: 00:44:54 executing program 4: 00:44:54 executing program 3: 00:44:54 executing program 2: 00:44:54 executing program 5: 00:44:55 executing program 5: 00:44:55 executing program 3: 00:44:55 executing program 2: 00:44:55 executing program 4: 00:44:55 executing program 0: 00:44:55 executing program 5: 00:44:55 executing program 0: 00:44:55 executing program 2: 00:44:55 executing program 3: 00:44:55 executing program 4: 00:44:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:55 executing program 5: 00:44:55 executing program 4: 00:44:56 executing program 3: 00:44:56 executing program 0: 00:44:56 executing program 5: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000180)='./file0\x00', 0x1, 0x5) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fff, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) 00:44:56 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x20005f) write$binfmt_elf32(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c4600800000000008000004000002000600ca3f8bca0000000038000000000000f70400000000000000020000000000009226529a0001000000000000000000f8fb66ff000005000000000001000000010000000000310ff3eec1b0002c080700000044eb676718214d26887b9bf617ae42d1a08c2b"], 0x78) close(r0) uselib(&(0x7f0000000140)='./file0\x00') 00:44:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0x1) syz_extract_tcp_res(&(0x7f0000000100), 0x0, 0x0) timer_create(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:44:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) 00:44:56 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000340)={'veth0_to_bridge\x00', 0x1}) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) tee(r1, r0, 0x2, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e21, 0x2800000000, @loopback, 0x9}}, 0xdc1, 0x20, 0x800, 0x2, 0x10}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@sack_info={r3, 0xc19, 0x8001}, &(0x7f0000000600)=0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f00000002c0)={'filter\x00', 0x0, 0x4, 0x5e, [], 0x1, &(0x7f0000000180)=[{}], &(0x7f00000001c0)=""/94}, &(0x7f0000000240)=0x78) r4 = openat$cgroup_ro(r2, &(0x7f0000000280)="6300000000000000000200803d000000", 0x26e1, 0x0) ioctl(r4, 0x7, &(0x7f00000006c0)="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") epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r2, &(0x7f0000000640)={0x10000000}) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f00000004c0)={0x20}) pwritev(r4, &(0x7f0000000100)=[{&(0x7f00000000c0)="a1", 0x1}], 0x1, 0x0) [ 293.486066] IPVS: ftp: loaded support on port[0] = 21 00:44:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf32(r0, &(0x7f0000000b00)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) sendto(r0, &(0x7f0000000340)="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", 0x6d9, 0x0, 0x0, 0x0) 00:44:56 executing program 0: fstat(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) rt_sigprocmask(0xfffffffffffffffc, &(0x7f0000000300)={0x1}, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) set_robust_list(&(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)}, 0x18) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) gettid() [ 293.603497] audit: type=1326 audit(1543884296.293:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9799 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:44:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) [ 293.711060] IPVS: ftp: loaded support on port[0] = 21 00:44:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf32(r0, &(0x7f0000000b00)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) sendto(r0, &(0x7f0000000340)="7589f0da892457ee3604b3303d1176a13baaebcab9eba210a07246127b486e98e3029104796460b1dfef95b0368b0b19c338b1306db81cea8edfc66a6212607f01496a9963ef1a83caee01bd72e85c40dd287a0755ca6b801959badb1253ae3a85a47b0ec39b760f063d4756614fc1d3e68b9f4f32be2652ce67d2e776b433331ad58b9d70c0f258e00b9d56ff7ecb14e6050c70da00c5006b8cffd8f169f2861e2df3efe13056d1babf3dde7a2a1a5cc8cb207e10f61e215d2935a43c0db2cef01e23933caac8c3ea44870dd6b4e7e87ec42d4a8cfe2940ddd6a1b68a8b114bf5fc57a24b948eed855edf063898f64a0ce82678a3be37f9d56de9535406c2810de8f314a51ae300d351825ded003652d5ab0b30f7ced329324632f710076a9f79c3221e90ec03803b6ecd5595646214e391a3cfd74ca98d098d3fac9fccd6b0905b03f3c6a50eeef0e61cd07ad75b39267a304fb12bdde7b4d06e64a42aee0504ae42f36f13d5e3002975f648e632ec25aa10429d84a078914a28c47ae0b143f43b100790646f1f7bb25191ab9d0b210e18f5610749521e385a7dc15b6b946baa49a0b35b4c56947b57279e5b5e3d04baab408442f3ba124cc70dadeb8a564eb796fb7975859f50a8a41ebc9baf1ab48855b54d47884126e66d890d714fd57c5dec487bfb5d94c839d9bbe57e70dead6a26d44af14b53a620424cb3404a7e3961c7ff568f6345f6cc3a5c49be7e76a33e652acf88b3bbbe6f83bc49621654627eedc41393250fdc3f997f6aa3f4f8ba8184c8fc5fe9bd37ca8081077b72e93af80af9bf4a47f943df12bc25ca1f25fb5bc39fbe685aed03e20269fa1ceda0d1c31754b974081a14ec6801ab751acc29aff079fcde12237555463bf13eb77e16eeb6ae8aa7fe36806826fb5e4f86fa757ba66c7dc0ac4ffdfe411db3a40b1d0d6a79b1585122cc1d0c3a18f0aab8ac72942451f67ec6cc6fed353239f10a99c2a836b90320b803c04f931e6ffdad5d3dda56e62d379cd76eb87b8c9470cee2348913f2260e3ae0213183c4898c3d64bb826a5d227cc05e005538b1ac4e70f6fdda5e16b67a471c0d655e21c7dd5aa647058146104cad84a32002de9857704c66c162f866795076a503f69192fd49ffd327ac385012bc66edb2e14f0af6b53feeb6d8271391edd74396a986baa072bdf5221e829c7d8241cfb1c866112c8ca033e34fd845d84c5bc054646057fa523f757dcf484c8747314c5a1f5f11b3e0ba45edd10e09e9e2925fe4229bd155a1cc62a8928686d6518b3f0da7d39a2b26368bd07f9a3222ce9b3fe41b12988b004543879ac863842e0a81ee7b9ebc1a98bdb020d617c00953a9cd98632b7b2024f6be6cb8795688c131950a77579850aef05278eb5e7692a6bb52200a0d37327ceff14d7f75fa6f6058197caf451ff520a80e05231db86fd254da587cd70d0b8c74b1a81be258aa355968d5730c0c5234a85dde00fabc96ecfe2d483ebe79487124d5bc77b03fefba765c138d0302e2d3c65dbf6f2833aea785a0c66ec6cd7ad463aa158a23185ee494f886e35cc7051fab1ebd22751200c3790e090d122490a330df980e1e60f9930bca4410adc36e4fb5be6241e3db72972371e6da890306ac9a3bc9b5ce6ef3a71a5ce0652a17433edbc46da151d1cecf946a52c9cd9dba5021924e6f3d038d10d27d424e152e852bd1095bdc533c6b9f43f6e9ef2714d7e6c26da09ad3f6d22dc8ff14d3546a339e3be4751b422054be4199bc05d6a71f4a236bf9e5681e23e1a4b9943ebeb1424f89596afed8c61d3c7e6554959fefd8a1923c3256199c7e3c4142108bb6c817a44e1de7621f0311adf5a9fcf3e209b9af7183b4c42d32586d5ab7a9d4d32f482aa6aee9af9ebe79d0dca8e0d716903f468f48c71c92a4f30da7dad9781a153e71d23d082b419e5f7bf1f956a7aa3a22ab66b0a00333c1c085679910e8a66994dc09f142907597b170390ec0d5a3ab0c6d22dd6a9b92f598d884d65235e47fb8459a5014f1c95f5bcaebb0066620cb890134fee3f03ecf530f9e4533b8dbfa2a5a8405e127b4164fe8d027e1a3a61081c5a04ed9a328da849deb9d154901daf4912baf3eafa3bdd8648cad22afa4aa0c0001e376fba11971e0fe4e418fa001cd56d5f3ea94178becbe2189d5a6d649b2889310f433625cf528bd6ce0f252ba879552b3134a1623ef2809d9a53b07d6ed0e62bbd660b8a7c54243ff20548c32b7a902ea6e133ac0d813c07bc2b60b05ab371bf32e5eaa0d1fd2e9595725f70bb0e855946be5d5017648e70057b08625a2b3227a59eb83ebd3b9e4c76d62b3fc6ecb0944b09abfc9adbfb2afd8ce62efdbb9b2c669f2d0645227cd4c9bc4d8857fd3cae24c92ce419c1d794b4419035f541bf0afdb37092844f0c27193622e25ea341ff22158023e93cc1da75345dd6b9d5a391d13ff88ada95ab21438", 0x6d9, 0x0, 0x0, 0x0) 00:44:56 executing program 0: fstat(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) rt_sigprocmask(0xfffffffffffffffc, &(0x7f0000000300)={0x1}, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) set_robust_list(&(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)}, 0x18) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) gettid() 00:44:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) dup2(0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:44:56 executing program 0: fstat(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) rt_sigprocmask(0xfffffffffffffffc, &(0x7f0000000300)={0x1}, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) set_robust_list(&(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)}, 0x18) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) gettid() [ 294.384846] audit: type=1326 audit(1543884297.073:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=9799 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:44:58 executing program 0: fstat(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) rt_sigprocmask(0xfffffffffffffffc, &(0x7f0000000300)={0x1}, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) set_robust_list(&(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)}, 0x18) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) gettid() 00:44:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) dup2(0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:44:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0x1) syz_extract_tcp_res(&(0x7f0000000100), 0x0, 0x0) timer_create(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:44:58 executing program 5: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000180)='./file0\x00', 0x1, 0x5) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fff, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) 00:44:58 executing program 4: fstat(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) rt_sigprocmask(0xfffffffffffffffc, &(0x7f0000000300)={0x1}, 0x0, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$BLKBSZSET(r0, 0x40081271, 0x0) set_robust_list(&(0x7f0000000480)={0x0, 0xfffffffffffffffe, &(0x7f0000000440)}, 0x18) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) gettid() 00:44:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000109, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @broadcast}, {0x0, @local}, 0x8, {0x2, 0x0, @empty}, 'team_slave_0\x00'}) 00:44:58 executing program 4: fstat(0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) rt_sigprocmask(0xfffffffffffffffc, &(0x7f0000000300)={0x1}, 0x0, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$BLKBSZSET(r0, 0x40081271, 0x0) set_robust_list(&(0x7f0000000480)={0x0, 0xfffffffffffffffe, &(0x7f0000000440)}, 0x18) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) gettid() [ 295.548416] IPVS: ftp: loaded support on port[0] = 21 00:44:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:58 executing program 4: fstat(0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) rt_sigprocmask(0xfffffffffffffffc, &(0x7f0000000300)={0x1}, 0x0, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$BLKBSZSET(r0, 0x40081271, 0x0) set_robust_list(&(0x7f0000000480)={0x0, 0xfffffffffffffffe, &(0x7f0000000440)}, 0x18) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) gettid() 00:44:58 executing program 0: io_setup(0x5, &(0x7f0000000100)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000400)={"0000000000000000000000000200", 0x20000005003}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x319, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, 0x0}]) 00:44:58 executing program 5: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000180)='./file0\x00', 0x1, 0x5) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fff, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) 00:44:58 executing program 4: 00:44:58 executing program 2: 00:44:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) [ 296.009758] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0x1) syz_extract_tcp_res(&(0x7f0000000100), 0x0, 0x0) timer_create(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:44:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000400)=""/66, 0x42}, {&(0x7f0000001480)=""/164, 0xa4}, {&(0x7f0000000480)=""/4096, 0xcdc}], 0x3}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)={0x14, 0x42, 0x105}, 0x3e9}}, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 00:44:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c125f85719070") unshare(0x400) r1 = socket(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x3d, &(0x7f0000000000), 0x4) [ 296.101227] IPVS: ftp: loaded support on port[0] = 21 [ 296.103060] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:44:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:44:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', @ifru_data=&(0x7f00000004c0)="85828efe55ebed48d53e39fc0eae88d3ec3ae5ee04b7b769e056b120956a21f3"}) 00:44:59 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x400000000080) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f00000000c0)=ANY=[]}) 00:45:00 executing program 5: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000180)='./file0\x00', 0x1, 0x5) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fff, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x2, 0x0) 00:45:00 executing program 0: 00:45:00 executing program 4: 00:45:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:45:00 executing program 2: 00:45:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0x1) syz_extract_tcp_res(&(0x7f0000000100), 0x0, 0x0) timer_create(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:45:00 executing program 2: 00:45:00 executing program 4: 00:45:00 executing program 0: 00:45:00 executing program 4: 00:45:00 executing program 2: 00:45:00 executing program 0: [ 297.792910] IPVS: ftp: loaded support on port[0] = 21 00:45:00 executing program 5: 00:45:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003040)=[{{&(0x7f00000018c0)=@ipx={0x4, 0x0, 0x0, "982a5c276750"}, 0x80, 0x0}}], 0x300, 0x0) 00:45:00 executing program 0: 00:45:00 executing program 2: 00:45:00 executing program 4: 00:45:01 executing program 4: 00:45:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 00:45:01 executing program 0: 00:45:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0x1) syz_extract_tcp_res(&(0x7f0000000100), 0x0, 0x0) timer_create(0x0, 0x0, 0x0) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:45:01 executing program 5: 00:45:01 executing program 2: 00:45:01 executing program 2: 00:45:01 executing program 4: 00:45:01 executing program 5: 00:45:01 executing program 0: 00:45:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 00:45:01 executing program 2: 00:45:01 executing program 0: 00:45:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0x1) syz_extract_tcp_res(&(0x7f0000000100), 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:45:02 executing program 4: 00:45:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 00:45:02 executing program 5: 00:45:02 executing program 2: 00:45:02 executing program 0: 00:45:02 executing program 2: 00:45:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x0, 0x0) 00:45:02 executing program 5: 00:45:02 executing program 0: 00:45:02 executing program 4: socketpair$unix(0x1, 0x3, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 00:45:02 executing program 4: capset(&(0x7f0000000000)={0x20071026}, &(0x7f0000001fe8)) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 299.698847] capability: warning: `syz-executor4' uses deprecated v2 capabilities in a way that may be insecure 00:45:03 executing program 2: socketpair$unix(0x1, 0x200000002, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'iw6tnl0\x00', 0x1}) dup3(r0, r1, 0x0) 00:45:03 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast2}}]}, 0x110) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 00:45:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x0, 0x0) 00:45:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0x1) timer_create(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:45:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msync(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000180)=0x3d, 0x4) sendto$inet6(r1, &(0x7f0000000040)="020300000700000000000000fff55b4202938207d9018080398d5b75000000007929301ee616d5c01843e065900854417e2bf3f8a0b3222a2bb42f2dbd94c3b50035110f118d0000f55dc62600009b00b4764523acf2c756642490a7b5fc88046a0000000000000000000000", 0x6c, 0x0, 0x0, 0x0) 00:45:03 executing program 4: clone(0x0, 0x0, 0x0, 0x0, 0x0) rmdir(0x0) 00:45:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x0, 0x0) 00:45:03 executing program 0: futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) exit(0x0) 00:45:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x20000000, 0x0, 0x0) 00:45:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[{0x10, 0x0, 0x7}], 0x10}}], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) 00:45:03 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback}, 0x80}}], 0x1, 0x0) 00:45:03 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x10000}) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x20000000) 00:45:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x0, 0xffffffffffefffff}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 00:45:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="636c6561725f7265667300a04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8ed0500f073e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54de66186a0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581295b31beaeaffb76778a196ad93aa3d2d7a06720827") r1 = syz_open_procfs(0x0, &(0x7f0000000680)="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") sendfile(r0, r1, 0x0, 0x1) readahead(0xffffffffffffffff, 0x0, 0x0) 00:45:03 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) link(0x0, 0x0) 00:45:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000040)='stat\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x8005) 00:45:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 00:45:03 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)="2e2f6367726f75700000000000db887974a9d4b8049e206606a808fcfe3dd31291f786cee92a2ed9cc0eeb0f6e1b21700557d7d321c616f2a69f975e5d5807683103cf48516fd96063603193e1cc3109ac8eeb3489d6a5d86eea6fc66adc6c92378d49", 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) close(r1) 00:45:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) syz_open_pts(r0, 0x0) timer_create(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:45:04 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @broadcast}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'team0\x00'}) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2000005) pwritev(r0, &(0x7f0000000300)=[{&(0x7f0000001000)="019e19a5feed9c74a604099765cced74be7be6d957336e4c63dd2a9d55bd87", 0x1f}], 0x1, 0x8) listxattr(0x0, &(0x7f00000013c0)=""/21, 0x15) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 00:45:04 executing program 5: io_setup(0x5, &(0x7f0000000100)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000400)={"0000000000000000000000000200", 0x20000005003}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, 0x0}]) 00:45:04 executing program 0: 00:45:04 executing program 4: 00:45:04 executing program 2: 00:45:04 executing program 4: 00:45:04 executing program 2: 00:45:04 executing program 0: 00:45:04 executing program 1: 00:45:04 executing program 4: 00:45:04 executing program 2: 00:45:04 executing program 5: 00:45:04 executing program 0: 00:45:04 executing program 1: 00:45:04 executing program 4: 00:45:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) read(0xffffffffffffffff, &(0x7f0000000280)=""/1, 0x1) timer_create(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:45:04 executing program 2: 00:45:04 executing program 2: 00:45:04 executing program 5: 00:45:04 executing program 0: 00:45:04 executing program 4: 00:45:04 executing program 1: 00:45:04 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/1, 0x1) timer_create(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:45:04 executing program 1: 00:45:04 executing program 0: 00:45:05 executing program 4: 00:45:05 executing program 5: 00:45:05 executing program 2: 00:45:05 executing program 3: read(0xffffffffffffffff, &(0x7f0000000280)=""/1, 0x1) timer_create(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:45:05 executing program 0: 00:45:05 executing program 1: 00:45:05 executing program 5: 00:45:05 executing program 4: 00:45:05 executing program 2: 00:45:05 executing program 1: 00:45:05 executing program 0: 00:45:05 executing program 5: 00:45:05 executing program 4: 00:45:05 executing program 2: 00:45:05 executing program 1: 00:45:06 executing program 2: 00:45:06 executing program 4: 00:45:06 executing program 0: 00:45:06 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/1, 0x1) timer_create(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:45:06 executing program 5: 00:45:06 executing program 1: 00:45:06 executing program 1: 00:45:06 executing program 0: 00:45:06 executing program 4: shmget(0x2, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) 00:45:06 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:45:06 executing program 5: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80200000000002, &(0x7f00000000c0)=0x182, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) 00:45:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280)="a405", 0x2, 0x20000081, 0x0, 0x0) 00:45:06 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) 00:45:06 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000200)=0x100000000, 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x5b, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto(r0, &(0x7f0000000800)="7589f0da892457ee3604b3303d1176a13baaebcab9eba210a07246127b486e98e3029104796460b1dfef95b0368b0b0bc338b1306db81cea8edfc66a6212607f01496a9963ef1a83caee01bd72e85c40dd287a0755ca6b801959badb1253ae3a85a47b0ec39b760f063d4756614fc1d3e68b9f4f32be2652ce67d2e776b433331ad58b9d70c0f258e00b9d56ff7ecb14e6050c70da00c5006b8cffd8f169f2861e2df3efe13056d1babf3dde7a2a1a5cc8cb207e10f61e215d2935a43c0db2cef01e23933caac8c3ea44870dd6b4e7e87ec42d4a8cfe2940ddd6a1b68a8b114bf5fc57a24b948eed855edf063898f64a0ce82678a3be37f9d56de9535406c2810de8f314a51ae300d351825ded003652d5ab0b30f7ced329324632f710076a9f79c3221e90ec03803b6ecd5595646214e391a3cfd74ca98d098d3fac9fccd6b0905b03f3c6a50eeef0e61cd07ad75b39267a304fb12bdde7b4d06e64a42aee0504ae42f36f13d5e3002975f648e632ec25aa10429d84a078914a28c47ae0b143f43b100790646f1f7bb25191ab9d0b210e18f5610749521e385a7dc15b6b946baa49a0b35b4c56947b57279e5b5e3d04baab408442f3ba124cc70dadeb8a564eb796fb7975859f50a8a41ebc9baf1ab48855b54d47884126e66d890d714fd57c5dec487bfb5d94c839d9bbe57e70dead6a26d44af14b53a620424cb3404a7e3961c7ff568f6345f6cc3a5c49be7e76a33e652acf88b3bbbe6f83bc49621654627eedc41393250fdc3f997f6aa3f4f8ba8184c8fc5fe9bd37ca8081077b72e93af80af9bf4a47f943df12bc25ca1f25fb5bc39fbe685aed03e20269fa1ceda0d1c31754b974081a14ec6801ab751acc29aff079fcde12237555463bf13eb77e16eeb6ae8aa7fe36806826fb5e4f86fa757ba66c7dc0ac4ffdfe411db3a40b1d0d6a79b1585122cc1d0c3a18f0aab8ac72942451f67ec6cc6fed353239f10a99c2a836b90320b803c04f931e6ffdad5d3dda56e62d379cd76eb87b8c9470cee2348913f2260e3ae0213183c4898c3d64bb826a5d227cc05e005538b1ac4e70f6fdda5e16b67a471c0d655e21c7dd5aa647058146104cad84a32002de9857704c66c162f866795076a503f69192fd49ffd327ac385012bc66edb2e14f0af6b53feeb6d8271391edd74396a986baa072bdf5221e829c7d8241cfb1c866112c8ca033e34fd845d84c5bc054646057fa523f757dcf484c8747314c5a1f5f11b3e0ba45edd10e09e9e2925fe4229bd155a1cc62a8928686d6518b3f0da7d39a2b26368bd07f9a3222ce9b3fe41b12988b004543879ac863842e0a81ee7b9ebc1a98bdb020d617c00953a9cd98632b7b2024f6be6cb879", 0x3d3, 0x80000000000, 0x0, 0x0) 00:45:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x5b, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto(r0, &(0x7f0000000800)="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", 0x3d3, 0x80000000000, 0x0, 0x0) 00:45:06 executing program 4: r0 = socket$kcm(0xa, 0x4000000006, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0xa, &(0x7f0000000080)=r0, 0x4) 00:45:06 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x2f, '\x00\x00'}]}, 0x4) 00:45:06 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r0 = socket$kcm(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x25, &(0x7f0000000140)=r2, 0x1f4) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f00000003c0)=@in6={0xa, 0x4e20, 0x0, @loopback={0xffffffffa0010000}}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=""/52, 0x34}, 0x2000) 00:45:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="2f02726f75702e7374617000", 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000140)}, 0xfffffe27) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) 00:45:06 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:45:06 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000040)=0x2) 00:45:06 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/1, 0x1) timer_create(0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000680), 0x8) 00:45:07 executing program 5: r0 = socket$kcm(0xa, 0x4000000006, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0xa, &(0x7f0000000000), 0x4) 00:45:07 executing program 2: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@in6={0xa, 0x4305, 0xd, @mcast1}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000240)="d90ffcc82e69b921624e30a32ddc7503b09e14c83ee29dae", 0x18}], 0x1}, 0x0) 00:45:07 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'veth0_to_bridge\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)={0x2, 0x0, [0x0, 0x0]}) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000640)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000d80)={&(0x7f0000000a40)=@can, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)=""/56, 0x38}, {&(0x7f0000000cc0)=""/115, 0x73}], 0x2, &(0x7f0000000d40)=""/53, 0x35, 0x5}, 0x40002020) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xfb, &(0x7f0000000340)=""/251}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000bc0)="2f67726f7574002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac752a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1c0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98ace3574511e0c61f722ff61f1db073657764c13f23ed76e9f5ad9b0a121d3019202a82a3e997831b6e1e10f53b98ab1eb37dc61e5717d51a0369715e1e92e66a6b80c82805f9df4f8a02c23d874f64ae00", 0x2761, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)={0xd, 0x0, 0x9, 0x5, 0x1, r1, 0x9}, 0x2c) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28}, {0x16, 0x0, 0x4}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000680)="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") bpf$PROG_LOAD(0x5, &(0x7f0000007540)={0x0, 0xa, &(0x7f00000005c0)=ANY=[@ANYBLOB="25140c005400051e98e47d279cb8aff9d28ca4cef0710000005bdf9007d87b86000000000000003752000076f09a000000000097808ff2c8c5a478ac991eca7297fe52e6f6c2ff16421ffe8c83ab7599e0"], 0x0, 0x4, 0x0, 0x0, 0x41100, 0x1}, 0x48) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000b00)}, 0x0) recvmsg$kcm(r2, &(0x7f0000002b00)={&(0x7f00000002c0)=@sco, 0x80, &(0x7f0000002940)=[{&(0x7f00000003c0)=""/200, 0xc8}, {&(0x7f0000000900)=""/194, 0xc2}, {&(0x7f00000015c0)=""/197, 0xc5}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/242, 0xf2}, {&(0x7f00000027c0)=""/215, 0xd7}], 0x6, &(0x7f0000002a00)=""/216, 0xd8, 0x3}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) 00:45:07 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x17, &(0x7f0000000200)=r0, 0xdf) 00:45:07 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='vboxnet1@cgroupcgroupvmnet1%\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x0, 0x10}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100, 0x8000a0}, 0x28) 00:45:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 00:45:07 executing program 4: 00:45:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a008193e4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) 00:45:07 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x17, &(0x7f0000000200)=r0, 0xdf) 00:45:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept(r0, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000100)=0x80) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000280)={r0}) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000540)=0x4) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000140)={'ip6gre0\x00', 0x7}) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x7fff, 0x4) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'erspan0\x00'}) accept$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) getsockname$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@loopback, @in=@local}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000008e00)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000008f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000008f40)={{{@in6=@ipv4={[], [], @broadcast}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000009040)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009080)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000009180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000091c0)={'vcan0\x00'}) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000009200)={@dev, @broadcast}, &(0x7f0000009240)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000092c0)={{{@in6=@dev, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000093c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000009440)={{{@in6, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000009540)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009640)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000009740)=0xe8) accept4$packet(r1, &(0x7f0000009780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000097c0)=0x14, 0x80800) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000009ac0)={@ipv4={[], [], @local}}, &(0x7f0000009b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f000000be80)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f000000bf80)=0xe8) getpeername$packet(r2, &(0x7f000000bfc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c000)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000c040)={'gretap0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000c0c0)={'vcan0\x00', 0x0}) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f000000c100)={@loopback, 0x0}, 0xffffffffffffffff) getpeername$packet(r2, &(0x7f000000c140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000c180)=0x14) getsockname$packet(r2, &(0x7f000000c1c0)={0x11, 0x0, 0x0}, &(0x7f000000c200)=0x14) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f000000c500)={@multicast1, @local, 0x0}, &(0x7f000000c540)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f000000cc80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x44040}, 0xc, &(0x7f000000cc40)={&(0x7f000000c580)={0x1c4, r4, 0x100, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r5}, {0x1a8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}]}}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x1}, 0x4) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000d84000)={0xa, 0x2, 0xfffffffffffffffd, @mcast2}, 0xffffffffffffffa5) r12 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r12, 0x0, 0x0, &(0x7f0000000000), 0x4) listen(r0, 0x2) socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet6_mtu(r11, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000040)=0x4) r13 = socket$inet(0x2, 0x6000000000000001, 0x8000000000000) bind$inet(r13, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) sendto$inet(r13, 0x0, 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r13, 0x1, 0x25, &(0x7f00000008c0)=0x7fe, 0x370) 00:45:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept(r0, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000100)=0x80) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000280)={r0}) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000540)=0x4) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000140)={'ip6gre0\x00', 0x7}) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0)=0x7fff, 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'erspan0\x00'}) accept$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) getsockname$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@loopback, @in=@local}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000008e00)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000008f00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000008f40)={{{@in6=@ipv4={[], [], @broadcast}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000009040)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009080)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000009180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000091c0)={'vcan0\x00'}) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000009200)={@dev, @broadcast}, &(0x7f0000009240)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000092c0)={{{@in6=@dev, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000093c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000009440)={{{@in6, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000009540)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009640)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000009740)=0xe8) accept4$packet(r1, &(0x7f0000009780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000097c0)=0x14, 0x80800) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000009ac0)={@ipv4={[], [], @local}}, &(0x7f0000009b00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f000000be80)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f000000bf80)=0xe8) r4 = socket$inet(0x2, 0x6000000000000001, 0x8000000000000) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000008c0)=0x7fe, 0x370) 00:45:07 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/1, 0x1) timer_create(0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigsuspend(0x0, 0x0) 00:45:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{}, {0x0, @dev}, 0x4, {0x2, 0x0, @broadcast}, 'veth0_to_bond\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{}, {}, 0x0, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) 00:45:07 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'veth0_to_bridge\x00'}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)={0x2, 0x0, [0x0, 0x0]}) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000640)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000d80)={&(0x7f0000000a40)=@can, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000ac0)=""/56, 0x38}, {&(0x7f0000000cc0)=""/115, 0x73}], 0x2, &(0x7f0000000d40)=""/53, 0x35, 0x5}, 0x40002020) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xfb, &(0x7f0000000340)=""/251}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000bc0)="2f67726f7574002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac752a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1c0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98ace3574511e0c61f722ff61f1db073657764c13f23ed76e9f5ad9b0a121d3019202a82a3e997831b6e1e10f53b98ab1eb37dc61e5717d51a0369715e1e92e66a6b80c82805f9df4f8a02c23d874f64ae00", 0x2761, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)={0xd, 0x0, 0x9, 0x5, 0x1, r1, 0x9}, 0x2c) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28}, {0x16, 0x0, 0x4}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000680)="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") bpf$PROG_LOAD(0x5, &(0x7f0000007540)={0x0, 0xa, &(0x7f00000005c0)=ANY=[@ANYBLOB="25140c005400051e98e47d279cb8aff9d28ca4cef0710000005bdf9007d87b86000000000000003752000076f09a000000000097808ff2c8c5a478ac991eca7297fe52e6f6c2ff16421ffe8c83ab7599e0"], 0x0, 0x4, 0x0, 0x0, 0x41100, 0x1}, 0x48) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000b00)}, 0x0) recvmsg$kcm(r2, &(0x7f0000002b00)={&(0x7f00000002c0)=@sco, 0x80, &(0x7f0000002940)=[{&(0x7f00000003c0)=""/200, 0xc8}, {&(0x7f0000000900)=""/194, 0xc2}, {&(0x7f00000015c0)=""/197, 0xc5}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/242, 0xf2}, {&(0x7f00000027c0)=""/215, 0xd7}], 0x6, &(0x7f0000002a00)=""/216, 0xd8, 0x3}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) 00:45:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8954, &(0x7f0000000080)={{}, {}, 0x0, {0x2, 0x0, @local}, 'veth0_to_bond\x00'}) 00:45:07 executing program 1: 00:45:07 executing program 3: 00:45:07 executing program 1: 00:45:07 executing program 2: 00:45:07 executing program 4: 00:45:08 executing program 3: 00:45:08 executing program 1: 00:45:08 executing program 5: 00:45:08 executing program 2: 00:45:08 executing program 4: 00:45:08 executing program 1: 00:45:08 executing program 0: 00:45:08 executing program 3: 00:45:08 executing program 3: 00:45:08 executing program 1: 00:45:08 executing program 4: 00:45:08 executing program 0: 00:45:08 executing program 2: 00:45:08 executing program 3: 00:45:08 executing program 5: 00:45:08 executing program 4: 00:45:08 executing program 3: 00:45:08 executing program 2: 00:45:08 executing program 1: 00:45:08 executing program 0: 00:45:08 executing program 5: 00:45:08 executing program 2: 00:45:08 executing program 4: 00:45:08 executing program 0: 00:45:08 executing program 3: 00:45:08 executing program 5: 00:45:08 executing program 1: 00:45:08 executing program 2: 00:45:08 executing program 0: 00:45:08 executing program 4: 00:45:08 executing program 5: 00:45:08 executing program 3: 00:45:08 executing program 1: 00:45:08 executing program 0: 00:45:08 executing program 2: 00:45:08 executing program 4: 00:45:09 executing program 5: 00:45:09 executing program 3: 00:45:09 executing program 4: 00:45:09 executing program 1: 00:45:09 executing program 0: 00:45:09 executing program 2: 00:45:09 executing program 3: 00:45:09 executing program 5: 00:45:09 executing program 4: 00:45:09 executing program 1: 00:45:09 executing program 0: 00:45:09 executing program 2: 00:45:09 executing program 5: 00:45:09 executing program 1: 00:45:09 executing program 3: 00:45:09 executing program 4: 00:45:09 executing program 0: 00:45:09 executing program 2: 00:45:09 executing program 1: 00:45:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) setgroups(0x0, 0x0) 00:45:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x73, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) r1 = getpgrp(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, r1}) sendto(r0, &(0x7f0000000140)="d8", 0x1, 0x1, 0x0, 0x0) 00:45:09 executing program 0: 00:45:09 executing program 4: 00:45:09 executing program 2: 00:45:09 executing program 1: 00:45:09 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) [ 306.989999] audit: type=1326 audit(1543884309.673:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10434 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:09 executing program 4: openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) 00:45:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) dup2(r0, r1) 00:45:09 executing program 3: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x15) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 00:45:09 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2) write$uinput_user_dev(r0, &(0x7f0000000540)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73eb]}, 0x45c) 00:45:09 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 00:45:10 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000500)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580), 0x0, 0x0) 00:45:10 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 00:45:10 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syncfs(r0) [ 307.749210] audit: type=1326 audit(1543884310.433:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10434 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:10 executing program 1: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) iopl(0x3) creat(&(0x7f0000000140)='./file0\x00', 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:10 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, 0x0}) clone(0x0, &(0x7f000075cf53), 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f000000df36)="12"}) [ 307.839162] audit: type=1800 audit(1543884310.523:44): pid=10468 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17023 res=0 [ 307.879523] binder: 10470:10475 ERROR: BC_REGISTER_LOOPER called without request 00:45:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000340)) 00:45:10 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, &(0x7f0000000100)={0x2}, 0x8) [ 307.987628] binder: 10470:10487 ERROR: BC_REGISTER_LOOPER called without request 00:45:10 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000040)={0x240, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1}) iopl(0x3) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000000)={0x7, 0x5, 0x9, 0x2, 0x3, 0x10001, 0x5}) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10008}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)={0x40, r3, 0xc00, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x4048011}, 0x81) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f00000001c0)={0x20, 0x4, 0x64, 0x2, 0x3000000000000000, 0x9}) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:10 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000580)="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") lseek(r0, 0xffffffffffffffff, 0x4) 00:45:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000580)="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") lseek(r0, 0xffffffffffffffff, 0x4) 00:45:11 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000100)={0x0, 0x0, 0x0}) 00:45:11 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:11 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) unshare(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000000)={0x0, 0x5, 0x0, 0x0, 0x3, 0x0, 0x5}) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4048011}, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f00000001c0)={0x0, 0x4, 0x0, 0x2}) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2) ustat(0x2, &(0x7f0000000980)) 00:45:11 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x801, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:45:11 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000040)={0x240, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1}) iopl(0x3) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000000)={0x7, 0x5, 0x9, 0x2, 0x3, 0x10001, 0x5}) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10008}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)={0x40, r3, 0xc00, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x4048011}, 0x81) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f00000001c0)={0x20, 0x4, 0x64, 0x2, 0x3000000000000000, 0x9}) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:11 executing program 0: getrusage(0x690da10ccffdedd9, 0x0) 00:45:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) 00:45:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000006100)={{{@in6=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@empty}}, 0xe8) [ 308.921913] input: syz1 as /devices/virtual/input/input8 00:45:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000180)={@ipv4={[], [], @broadcast}}) [ 308.971632] input: syz1 as /devices/virtual/input/input9 00:45:11 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000040)=@known='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 00:45:11 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:12 executing program 4: 00:45:12 executing program 0: 00:45:12 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) unshare(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000000)={0x0, 0x5, 0x0, 0x0, 0x3, 0x0, 0x5}) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4048011}, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f00000001c0)={0x0, 0x4, 0x0, 0x2}) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2) ustat(0x2, &(0x7f0000000980)) 00:45:12 executing program 4: 00:45:12 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:12 executing program 1: 00:45:12 executing program 0: 00:45:12 executing program 5: 00:45:12 executing program 1: 00:45:12 executing program 4: 00:45:12 executing program 0: 00:45:12 executing program 5: 00:45:12 executing program 3: 00:45:12 executing program 0: 00:45:12 executing program 1: 00:45:12 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 00:45:12 executing program 4: 00:45:12 executing program 5: 00:45:12 executing program 3: 00:45:12 executing program 0: 00:45:12 executing program 1: 00:45:12 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x400000000000003) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") clock_getres(0xfffffffffffffffb, 0x0) 00:45:12 executing program 4: mknod$loop(&(0x7f0000000180)='./file1\x00', 0x400000000006008, 0x0) r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000080)) 00:45:12 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) 00:45:12 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{&(0x7f0000003980)=@rc, 0x80, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:45:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000001200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x0, 0x0) 00:45:13 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) 00:45:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x806}}, @icmp=@parameter_prob={0xd, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 00:45:13 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x8}}, @icmp=@parameter_prob={0xd, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 00:45:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond_slave_0\x00'}) 00:45:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto(r0, &(0x7f0000000700)="9dd2b94b57cac0d48b2998d575aaf4686dd86b1e3dbb5b576765bd906483eccfa8ede3bdcc579546a17f88e5582531c3a5b87352427dc45aeaf89cb1ef1e76b9d438331f1e8936e2dba40667dbe27ca599fce45d140b5aa0abbb4e1dca6f7d2cae07f5e56bd1ffdf9e", 0x69, 0x4015, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) sendto(r0, &(0x7f0000000800)="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", 0x1f9, 0x4, 0x0, 0x0) 00:45:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x8}}, @icmp=@parameter_prob={0xd, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 00:45:13 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:13 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0xa, 0x8000) r2 = dup2(r1, r1) close(r2) 00:45:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x8}}, @icmp=@parameter_prob={0xd, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) [ 310.731523] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 310.761466] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:45:13 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:13 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x8}}, @icmp=@parameter_prob={0xd, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) [ 310.860336] syz-executor0 uses obsolete (PF_INET,SOCK_PACKET) [ 311.189852] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:45:15 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 00:45:15 executing program 1: 00:45:15 executing program 4: 00:45:15 executing program 5: 00:45:15 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:15 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f00000002c0), 0xffffff65}], 0x1, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000004, 0x100132, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 00:45:15 executing program 4: 00:45:15 executing program 5: 00:45:15 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 00:45:15 executing program 1: 00:45:15 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:15 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 00:45:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x5b, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto(r0, &(0x7f0000000800)="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", 0x3d3, 0x80000000000, 0x0, 0x0) 00:45:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto(r0, &(0x7f0000000700)="9d", 0x1, 0x4015, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="85", 0x1, 0x0, 0x0, 0x0) sendto(r0, &(0x7f00000002c0)='u', 0x1, 0x1, 0x0, 0x0) 00:45:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='reno\x00', 0x5) sendmmsg(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000000c40)="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", 0x5b1}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x4090}}], 0x1, 0x800) 00:45:16 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f000000df36)="12"}) 00:45:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x8}}, @icmp=@parameter_prob={0xd, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 00:45:16 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x5b, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x803, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto(r0, &(0x7f0000000800)="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", 0x3d3, 0x80000000000, 0x0, 0x0) 00:45:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x8}}, @icmp=@parameter_prob={0xd, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 00:45:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x10000) 00:45:16 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) [ 313.647915] binder: 10745:10749 ERROR: BC_REGISTER_LOOPER called without request 00:45:16 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x8}}, @icmp=@parameter_prob={0xd, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 00:45:16 executing program 1: 00:45:16 executing program 5: 00:45:16 executing program 4: 00:45:16 executing program 1: 00:45:17 executing program 0: 00:45:17 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0xd, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 00:45:17 executing program 5: 00:45:17 executing program 4: 00:45:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8001000000000a) r1 = dup2(r0, r0) write$P9_RREAD(r1, &(0x7f0000000100)={0x10, 0x75, 0x0, {0x5, "bacc93f814"}}, 0x10) [ 314.443741] binder: 10745:10783 ERROR: BC_REGISTER_LOOPER called without request 00:45:17 executing program 5: 00:45:17 executing program 0: 00:45:17 executing program 4: 00:45:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0xd, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 00:45:17 executing program 1: 00:45:17 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:17 executing program 5: 00:45:17 executing program 1: 00:45:17 executing program 0: 00:45:17 executing program 4: 00:45:17 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0xd, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 00:45:17 executing program 5: 00:45:17 executing program 2: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:17 executing program 1: 00:45:17 executing program 0: 00:45:17 executing program 4: 00:45:17 executing program 3: 00:45:17 executing program 5: 00:45:17 executing program 1: 00:45:17 executing program 4: 00:45:17 executing program 3: 00:45:17 executing program 0: 00:45:17 executing program 5: 00:45:17 executing program 1: 00:45:17 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:18 executing program 0: 00:45:18 executing program 4: 00:45:18 executing program 3: 00:45:18 executing program 5: 00:45:18 executing program 1: 00:45:18 executing program 0: 00:45:18 executing program 4: 00:45:18 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:18 executing program 3: 00:45:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) 00:45:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0xfffffece) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) close(r1) syz_open_procfs(0x0, 0x0) close(r0) 00:45:18 executing program 0: ioprio_set$uid(0x3, 0x0, 0x7fff) 00:45:18 executing program 3: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000080), 0x10000027d) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mlockall(0x0) lgetxattr(0x0, 0x0, 0x0, 0xfffffffffffffd31) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0x26085d6cce6967cc}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) 00:45:18 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x224}, 0x43c5) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:45:18 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x224, 0x7b, 0x3}, 0xfffffe75) write$UHID_CREATE(r1, &(0x7f0000000340)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}, 0x120) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x1b0c7a) 00:45:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) 00:45:18 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:18 executing program 1: seccomp(0x1, 0x3, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x10006, 0x0, 0x0, 0x50000}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) 00:45:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) 00:45:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netlink\x00') lseek(r0, 0x0, 0x1) [ 315.897286] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 315.921387] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 00:45:18 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 00:45:18 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) [ 316.001692] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 316.049243] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 316.086610] netlink: 'syz-executor0': attribute type 29 has an invalid length. 00:45:18 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) [ 316.097129] audit: type=1326 audit(1543884318.783:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10911 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 316.131162] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 00:45:18 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000300)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000380)=0x1ef8) [ 316.133488] audit: type=1326 audit(1543884318.813:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10911 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 316.148867] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 316.224115] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 316.227866] audit: type=1326 audit(1543884318.813:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10911 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x483081 code=0x50000 [ 316.252890] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 316.252908] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 316.270483] audit: type=1326 audit(1543884318.813:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10911 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 316.308178] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 316.328432] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 316.335429] audit: type=1326 audit(1543884318.813:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10911 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x483081 code=0x50000 [ 316.335945] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 316.356484] audit: type=1326 audit(1543884318.813:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10911 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 316.386704] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 316.387824] audit: type=1326 audit(1543884318.813:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10911 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x483081 code=0x50000 [ 316.400373] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 316.417391] audit: type=1326 audit(1543884318.813:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10911 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 316.443372] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. [ 316.443741] audit: type=1326 audit(1543884318.813:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10911 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=35 compat=0 ip=0x483081 code=0x50000 [ 316.452579] netlink: 'syz-executor0': attribute type 29 has an invalid length. [ 316.472952] audit: type=1326 audit(1543884318.813:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=10911 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x50000 [ 316.493415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 316.510745] netlink: 'syz-executor3': attribute type 29 has an invalid length. [ 316.522868] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 00:45:19 executing program 3: socketpair$unix(0x1, 0x4000010000000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) 00:45:19 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/251, 0xfb}], 0x1) 00:45:19 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:45:19 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xf, 0x1}, 0x18) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000280)={0x0, 0x8000}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000003000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fanotify_init(0x0, 0x0) 00:45:21 executing program 1: 00:45:21 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000240)={0x0, 0x4}) 00:45:21 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:21 executing program 5: r0 = socket$kcm(0xa, 0x6, 0x0) sendmsg(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) close(r0) 00:45:21 executing program 0: r0 = socket$kcm(0x2, 0x805, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6e, 0x0, 0x109) 00:45:21 executing program 3: 00:45:21 executing program 5: 00:45:21 executing program 0: 00:45:21 executing program 4: 00:45:21 executing program 1: 00:45:21 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:21 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x8) dup2(r1, r0) 00:45:21 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) pwritev(r0, &(0x7f0000000300)=[{&(0x7f0000000280)='Q', 0x1}], 0x1, 0x0) 00:45:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfc, 0x2ffffffff}, 0xc) 00:45:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) ioprio_get$uid(0x3, r1) 00:45:21 executing program 1: prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000ffb000/0x3000)=nil) 00:45:22 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000340)=""/135, 0x87}], 0x1) 00:45:22 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f00000000c0)=""/1, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) close(r1) close(r0) 00:45:22 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000080)) 00:45:22 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) unshare(0x40000000) socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000100)}], 0x1}, 0x0) r2 = socket$inet(0x10, 0x3, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffe07, &(0x7f0000003040)=""/4096, 0x1000}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', @ifru_flags}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x0, 0x3, [@multicast1, @loopback, @loopback]}, 0x1c) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)=ANY=[@ANYBLOB="e00000027f0000010000000000000000b26babde9a0f3de0ec40993d0de7d64603d4edf6dfba84815830"], 0x1) 00:45:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000200)={0x0, 0x1}) 00:45:22 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x0, @multicast1}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast2}, 'ip_vti0\x00'}) 00:45:22 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) [ 319.555183] IPVS: ftp: loaded support on port[0] = 21 00:45:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) 00:45:22 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 00:45:22 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) close(r0) 00:45:22 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 00:45:22 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfdc30) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001780)=ANY=[@ANYBLOB="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"], 0x3d8) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xc28) 00:45:22 executing program 1: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400000000006008, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RFSYNC(r0, 0x0, 0x0) 00:45:22 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) [ 319.930905] IPVS: ftp: loaded support on port[0] = 21 00:45:22 executing program 0: r0 = msgget(0x1, 0x1) msgsnd(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgrcv(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="70d94928422071e700065fbd9fc66329ad8bbce1943464ffd79deaf9814eed17ba6edb791ea3b962bfb7352595afa40f26361dc877f22e9b74f007827aefc1ce7e8211a9d7a199c25d3df730eddb812d7f49263cd82f4d358870dfaa7c5b12a64058bf01589e5d737c1044febab6cbd21f33f423e4309cec88d4e822f19bdc7212403133f54e1cca720a226117efefc19e8425c799dc6adb33515360fc502b47"], 0x1, 0x7, 0x3800) msgget$private(0x0, 0x100) r3 = creat(&(0x7f0000000480)='./file0\x00', 0x9) keyctl$describe(0x6, 0x0, &(0x7f0000000340)=""/35, 0x23) msgget(0x3, 0x2) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000280)={'sit0\x00', 0x400}) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x174) 00:45:22 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x86000, 0x0) 00:45:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setpriority(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) sendto$inet(r1, &(0x7f0000000040)="91", 0x1, 0x0, 0x0, 0x0) 00:45:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6}]}, 0x10) timer_delete(0x0) socketpair$unix(0x1, 0x100040000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 00:45:22 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ustat(0x2, &(0x7f0000000980)) 00:45:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc)=0x200000004, 0x80, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000180), 0x21ffffff) 00:45:22 executing program 5: r0 = memfd_create(&(0x7f00000000c0)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write(r0, &(0x7f0000000300)="b1", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) futimesat(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 00:45:22 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x0, &(0x7f0000000980)) 00:45:23 executing program 0: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0x1c}}, 0x14) 00:45:23 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc)=0x200000004, 0x80, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000180), 0x21ffffff) 00:45:23 executing program 0: 00:45:23 executing program 3: 00:45:23 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) shutdown(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ustat(0x2, 0x0) 00:45:23 executing program 4: 00:45:23 executing program 5: 00:45:23 executing program 0: 00:45:23 executing program 5: 00:45:23 executing program 3: 00:45:23 executing program 4: 00:45:23 executing program 1: 00:45:23 executing program 5: 00:45:23 executing program 2: 00:45:23 executing program 0: 00:45:23 executing program 3: 00:45:23 executing program 1: 00:45:23 executing program 4: 00:45:24 executing program 2: 00:45:24 executing program 5: 00:45:24 executing program 0: 00:45:24 executing program 4: 00:45:24 executing program 1: 00:45:24 executing program 3: 00:45:24 executing program 5: 00:45:24 executing program 2: 00:45:24 executing program 0: 00:45:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r0, &(0x7f0000000800)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) 00:45:24 executing program 1: r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r2 = socket(0x4, 0x10000000004, 0xfffffffffffffffb) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @local}, 0x10) getpeername$inet(r2, &(0x7f0000000080), &(0x7f0000000040)=0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000140)={'icmp6\x00'}, &(0x7f0000000380)=0x1e) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@local, @in6=@mcast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000340)='lo\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000840)={{{@in, @in=@multicast2}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000740)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in=@loopback, @in=@remote}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000b00)='bbr\x00'}, 0x30) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000fc0)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001000)={{{@in=@loopback, @in6=@ipv4={[], [], @empty}}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000001100)=0xe8) getgid() getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001140)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001240)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1f, &(0x7f0000001300)="747275737465646b657972696e6776626f786e657431656d31a973656c6600"}, 0x30) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) getgid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001400)={{{@in6=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000001500)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) gettid() getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002940), &(0x7f0000002980)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000029c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002a00)={{{@in6=@local, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000002b00)=0xe8) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003400)={{{@in=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000003500)=0xe8) getgid() getpid() getuid() getgid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000035c0)={{{@in6}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f00000036c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000003740)=0xc) sendmmsg$unix(r2, &(0x7f0000003840)=[{0x0, 0x0, 0x0}], 0x1, 0x0) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x4e24}, 0x10) bind$inet(r3, &(0x7f0000000800)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000006c0)={0x0, 0x7fff, 0x80000001}, 0x14) shutdown(r3, 0x1) 00:45:24 executing program 2: 00:45:24 executing program 3: 00:45:24 executing program 5: 00:45:24 executing program 0: 00:45:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth1\x00', &(0x7f0000000000)=@ethtool_eeprom={0x4b}}) 00:45:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RRENAMEAT(r1, &(0x7f00000000c0)={0x7}, 0x7) creat(&(0x7f0000000140)='./file0/bus\x00', 0x0) 00:45:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$void(r0, 0xc0045878) 00:45:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") 00:45:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x10}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x31) 00:45:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0xfffffffffffffffe}, 0x0) 00:45:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000480)="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") flistxattr(r0, 0x0, 0x9) 00:45:24 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x11, 0x4, 0x4, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000c88000)={r1, &(0x7f00000003c0), 0x0}, 0x18) 00:45:24 executing program 5: socket$packet(0x11, 0x40000000000a, 0x300) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000040)) 00:45:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/53, 0x35}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/27, 0xe}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/35, 0x23}], 0x5, &(0x7f0000000600)=""/167, 0xa7, 0xfff}, 0x40000000) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000002c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000140)=r0, 0x4) socketpair(0x800000, 0x5, 0x2, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x894c, &(0x7f0000000040)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x100, 0x0, 0x0, 0x0, 0xa2, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000000, 0x200, 0x120, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r3, &(0x7f0000005640)={&(0x7f0000004300)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005500)=[{&(0x7f0000004380)=""/78, 0x4e}, {&(0x7f0000004400)=""/28, 0x1c}, {&(0x7f0000004440)=""/4096, 0x1000}, {&(0x7f0000005440)=""/187, 0xbb}], 0x4, &(0x7f0000005540)=""/214, 0xd6, 0x222345a4}, 0x121) bpf$PROG_LOAD(0x5, &(0x7f0000005680)={0x11, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="000000000000000085000000520000004339f1ffffffffffd0af0001ffffffff"], 0x0, 0xff, 0x0, 0x0, 0x41100, 0x0, [], r5, 0x8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000540)) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)=')\x00') ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000007c0)) r6 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x9, 0x7, 0xfffffffffffffffc, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f00000009c0)='./file0\x00', r1}, 0x10) getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r8, 0x2, 0x1, 0xfffffffffffffffc, &(0x7f0000000700)=[0x0, 0x0], 0x2}, 0x20) socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x0, 0x0, 0x0, 0x0, r9}, 0x2c) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000100)={r9, r10}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000940)={r7}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r10}, 0x10) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={r10}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x8916, &(0x7f0000000000)={r10}) 00:45:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x4040, 0x0) 00:45:24 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970203dc0d") write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) 00:45:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000300)=""/208, 0xd0}], 0x1) [ 322.346042] device lo entered promiscuous mode 00:45:25 executing program 1: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="000500e003009dacff01"], 0x1, 0x0, 0x0) r0 = socket$inet6(0x18, 0x4002, 0x0) connect(r0, &(0x7f0000000080)=@un=@abs={0x25af90167d5e1800}, 0x1c) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[{0x10}], 0x10}, 0x0) 00:45:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x800006, 0x0, 0x0, 0xfffffffffffffffc}]}) fchmodat(0xffffffffffffffff, 0x0, 0x0) 00:45:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) clock_nanosleep(0x0, 0x3, 0x0, &(0x7f0000000140)) 00:45:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet(0x2, 0x2, 0x0) dup3(r0, r1, 0x0) [ 322.525944] kauditd_printk_skb: 10498 callbacks suppressed [ 322.525958] audit: type=1326 audit(1543884325.213:10553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11250 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 322.598328] audit: type=1326 audit(1543884325.283:10554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11253 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 322.629246] audit: type=1326 audit(1543884325.313:10555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11256 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x800006, 0x0, 0x0, 0xfffffffffffffffc}]}) getpriority(0x0, 0x0) 00:45:25 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970203dc0d") write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) 00:45:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/53, 0x35}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/27, 0xe}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/35, 0x23}], 0x5, &(0x7f0000000600)=""/167, 0xa7, 0xfff}, 0x40000000) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000002c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000140)=r0, 0x4) socketpair(0x800000, 0x5, 0x2, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x894c, &(0x7f0000000040)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x100, 0x0, 0x0, 0x0, 0xa2, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000000, 0x200, 0x120, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r3, &(0x7f0000005640)={&(0x7f0000004300)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005500)=[{&(0x7f0000004380)=""/78, 0x4e}, {&(0x7f0000004400)=""/28, 0x1c}, {&(0x7f0000004440)=""/4096, 0x1000}, {&(0x7f0000005440)=""/187, 0xbb}], 0x4, &(0x7f0000005540)=""/214, 0xd6, 0x222345a4}, 0x121) bpf$PROG_LOAD(0x5, &(0x7f0000005680)={0x11, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="000000000000000085000000520000004339f1ffffffffffd0af0001ffffffff"], 0x0, 0xff, 0x0, 0x0, 0x41100, 0x0, [], r5, 0x8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000540)) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)=')\x00') ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000007c0)) r6 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x9, 0x7, 0xfffffffffffffffc, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f00000009c0)='./file0\x00', r1}, 0x10) getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r8, 0x2, 0x1, 0xfffffffffffffffc, &(0x7f0000000700)=[0x0, 0x0], 0x2}, 0x20) socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x0, 0x0, 0x0, 0x0, r9}, 0x2c) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000100)={r9, r10}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000940)={r7}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r10}, 0x10) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={r10}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x8916, &(0x7f0000000000)={r10}) [ 322.995691] audit: type=1326 audit(1543884325.683:10556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11266 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/53, 0x35}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/27, 0xe}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/35, 0x23}], 0x5, &(0x7f0000000600)=""/167, 0xa7, 0xfff}, 0x40000000) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000002c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000140)=r0, 0x4) socketpair(0x800000, 0x5, 0x2, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x894c, &(0x7f0000000040)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x100, 0x0, 0x0, 0x0, 0xa2, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000000, 0x200, 0x120, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r3, &(0x7f0000005640)={&(0x7f0000004300)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005500)=[{&(0x7f0000004380)=""/78, 0x4e}, {&(0x7f0000004400)=""/28, 0x1c}, {&(0x7f0000004440)=""/4096, 0x1000}, {&(0x7f0000005440)=""/187, 0xbb}], 0x4, &(0x7f0000005540)=""/214, 0xd6, 0x222345a4}, 0x121) bpf$PROG_LOAD(0x5, &(0x7f0000005680)={0x11, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="000000000000000085000000520000004339f1ffffffffffd0af0001ffffffff"], 0x0, 0xff, 0x0, 0x0, 0x41100, 0x0, [], r5, 0x8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000540)) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)=')\x00') ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000007c0)) r6 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x9, 0x7, 0xfffffffffffffffc, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f00000009c0)='./file0\x00', r1}, 0x10) getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r8, 0x2, 0x1, 0xfffffffffffffffc, &(0x7f0000000700)=[0x0, 0x0], 0x2}, 0x20) socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x0, 0x0, 0x0, 0x0, r9}, 0x2c) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000100)={r9, r10}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000940)={r7}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r10}, 0x10) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={r10}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x8916, &(0x7f0000000000)={r10}) 00:45:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/53, 0x35}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/27, 0xe}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/35, 0x23}], 0x5, &(0x7f0000000600)=""/167, 0xa7, 0xfff}, 0x40000000) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000002c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0)=0xffffffffffffffff, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000140)=r0, 0x4) socketpair(0x800000, 0x5, 0x2, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x894c, &(0x7f0000000040)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x100, 0x0, 0x0, 0x0, 0xa2, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000000, 0x200, 0x120, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r3, &(0x7f0000005640)={&(0x7f0000004300)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005500)=[{&(0x7f0000004380)=""/78, 0x4e}, {&(0x7f0000004400)=""/28, 0x1c}, {&(0x7f0000004440)=""/4096, 0x1000}, {&(0x7f0000005440)=""/187, 0xbb}], 0x4, &(0x7f0000005540)=""/214, 0xd6, 0x222345a4}, 0x121) bpf$PROG_LOAD(0x5, &(0x7f0000005680)={0x11, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="000000000000000085000000520000004339f1ffffffffffd0af0001ffffffff"], 0x0, 0xff, 0x0, 0x0, 0x41100, 0x0, [], r5, 0x8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000540)) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)=')\x00') ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000007c0)) r6 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x9, 0x7, 0xfffffffffffffffc, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000900)={&(0x7f00000009c0)='./file0\x00', r1}, 0x10) getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000840)={r8, 0x2, 0x1, 0xfffffffffffffffc, &(0x7f0000000700)=[0x0, 0x0], 0x2}, 0x20) socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x0, 0x0, 0x0, 0x0, r9}, 0x2c) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000100)={r9, r10}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000940)={r7}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r10}, 0x10) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={r10}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x8916, &(0x7f0000000000)={r10}) [ 323.319985] audit: type=1326 audit(1543884326.003:10557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11250 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:26 executing program 4: 00:45:26 executing program 5: [ 323.402135] audit: type=1326 audit(1543884326.073:10558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11253 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:26 executing program 4: 00:45:26 executing program 3: 00:45:26 executing program 2: [ 323.499756] audit: type=1326 audit(1543884326.153:10559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11256 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:26 executing program 5: 00:45:26 executing program 1: [ 323.795312] audit: type=1326 audit(1543884326.483:10560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11266 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:26 executing program 0: 00:45:26 executing program 2: 00:45:26 executing program 4: 00:45:26 executing program 3: 00:45:26 executing program 5: 00:45:26 executing program 1: 00:45:26 executing program 2: 00:45:26 executing program 5: 00:45:26 executing program 3: 00:45:26 executing program 1: 00:45:26 executing program 0: 00:45:26 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000100)) 00:45:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) 00:45:26 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000300)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, 0x0) 00:45:26 executing program 3: syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x6780) 00:45:26 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x17, 0x0, 0x7fffffff}) 00:45:26 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f00000000c0)) prlimit64(0x0, 0x0, 0x0, 0x0) 00:45:26 executing program 4: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) listen(r0, 0x800000000000080) syz_emit_ethernet(0x230, &(0x7f0000007000)={@local, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x222, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 00:45:27 executing program 2: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:45:27 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="70d94928422071e700065fbd9fc66329ad8bbce1943464ffd79deaf9814eed17ba6edb791ea3b962bfb7352595afa40f26361dc877f22e9b74f007827aefc1ce7e8211a9d7a199c25d3df730eddb812d7f49263cd82f4d358870dfaa7c5b12a64058bf01589e5d737c1044febab6cbd21f33f423e4309cec88d4e822f19bdc7212403133f54e1cca720a226117efefc19e8425c799dc6adb33515360fc502b47"], 0x1, 0x0, 0xa4a3ad41a879dde0) r1 = msgget(0xffffffffffffffff, 0x0) msgsnd(r1, &(0x7f0000000040)={0x3, "08adb724da2b409c893eb141b25d63c9c14cc21e0393c5682c89b2216da5678b04bbfcb445e0e937c4ebcb9fe28ecea5340f79819a36fa9e6c1cd1bb2d314e9670ed29184b6b1ef12eeb38873ff063e58edaaf29b9c7d09c1ae303247ab2847b583e1ca624f5f3770a48692ff0f3098a280820719b86c2936945e4798d2f5f83174548139a374c61c8a12beec802f93840148468e5520749143c26248279e185d704f5c3df39e7d4f58c8d7a6626aa13441021a5265b9c02af6c4269cabf86d7a2994c007c26d40d00293e2aced5d33d3974844ee6b13c98958553146494fd9b0859d4f900602f0209ad92ed98f8b7efbb03425d48ab48d5f82ede8111035b79abd9f45348da5b3a24286651eaeca648780e1e04f8467d032d49a241130eef961bcd27daaf95d73c814bcfc7148bdbdea0850a06ea7d8de81c0a8ad4ff6a3c4c2c976c8248512f1f703efb5fb883877a2de627036ad5ed5ad4734e3e492c68c394c0275650f8cc930e448ecc0d29b14adbe966a9690e6e740153df21bb6ca497e78c2d1f146664a4eca92343673cc6095b484fcf025ac3d012d09616a1114801760f94e5251415b38501a5c44cb35f93bdb2a830a92a0e3f1777b327145864c14a828cd7313ba55dec6586d445a20751b2c971c421f321247bb9906a89f9e60330b9f22cb3e1b9d5c53583cba333c70dd93761603c8448d879c8ea2011f40da263f65b2d11be51efcf8c6400e094d3ed1ad3fa281a402060ef95447ebdd47321a3d1ae9183dfa20533a44b288935e05aabb838d92af2c275dcc74b8eee34dc5e0fa0215757b62a31ef08bcf8186f3a6d73d5f821a978236231d4f1629a4c3b8f27e40b012fab71779886b4009bacf5290f56de2bea1661f81dc065fb7174b4b606d89eab895345335fcdf2c2af8912d9a7600dc8560e05d1c0be655074b5d236f785609b3a204cf2bb4a58d50705f6d6db26394dadf6b0309788262077d12eb8d2d958cc259da2198780a7a41a1ee38dca6bf3285df3cf0ea3d0df1404a5261e97fadd0cfb6e54e9c5a6a8586d82322717b521d87fbb2bce11eb5a064584b99f11cffb409a24583e6407435147bc0751b2849b8288aec0005c12f62ebf666b768766d3764fee4e208a2dc012539012ac9627209442bf77388a87b9b0bc87d1e9b47fb139395af4cc236eb4e387a624986151fd6a039f8b235fce89cefb74e9e546682940fb04b2488b9826db4f4095b49e46e90348acae9fc13bc7c70f8a4310f737318dc1c152e244ec887a864d53553b10df8829173b623deaa1f22decd53f7014e35519852e750fbc1d1dd4fc30ff1d1e88ca70287b20650a89a1016fc88b96037d8a46798abe742554334a281b0aa13883c2db9411a46c67a26211bfb6cb1af88a078fc297bbb8c7144650caae8166e7cadf66bf3e67ba5bbd4a6ab583a837ab9a47ec956eb0d0b7b0a6b9a4187651b9ffa46aa8636fb5182e58a9ac7e52d33f5ccdbd2e0cac66e3e73bd1c6b81d3ff92af5697012c9d91a98490c3a9443668854d376fc943d6d0e535ce48494ab2015e0eebd82326e940d8fc6d89448888ebd7f0f28548f5bafc4ce6a62cf6103b8409043811c64a2ddcf16e3b0c26239864cd76ce3eab1e2430d6351fdf0e5eec82f105b8084372ea98f7b77ae62ab62f55d68363e54482b6bf9e2ba626759491469358cce3ce75f4a011fb76a108b58e42820b776e29f13a71a0b244df699d8e1742f67a0a771a77fda20c6a8ffdf22e23fe40c1521c771715f2952eb23985d2b27c0e116949358791e1789fc2201a506c7820400b3b1fab11231c54f618c5fcf70f9473d9cc60638f6d72777e85ceb50a98625410dc1ebf05cbc48768d3a48bdc767b9c08c3daf7d45f7ebe0f8e450181d052663be5ad76f827206cc3e61acf88761d48fa1cba629c81498e19e24a57a1b557a1215c19675d75ed782dfe5fb0c2a4007bde955ec6da6f38dd0cd45e96a8cb7df32cf3ceed09de26a74c36ef861a6e01a2c5a223c69fdbd20d8ced99a6d7a694ab574505a9d5e72031dd2fb0db4f3c76cd6ca77a8f9f5c8de2e4b4ca0b13da93190818573f870dd6ef800c52a9ecd2c68642581604e6fe11aaf9006900f1302f028f28ab6940754a613fb541a32c1c80d245184045c1352563ec16208710f7dd966440aa315973bec852c211fc38f92f32c7bd316043ab3323418ec22634cfa3fc1c85a3a2b8d2a215093f3fe23d36c61b953b12e5293bece072c58544148cff77c5848f576918c48b68f794b37e2fc6ce5a22514332dccddbc50e7985893ce4d69fe519b5dda6ece3cfa15755f79c0c023758576afa32f08830032b93a68f7fd36c995bbcf54e1c45489eb85e2948220504498160969e7eea40806d481b67a5616c098904abc59a2a56d79faaf4e6826cde8e2e5672c244b97655a89cb3302efc16526276cc75f2aae904f05e141812b4df52463420e548d315a394b76763a0f531507c56eb1c0de0b957ecfc01f6f82755f213445107e0209bf5d49779bf807616c7ceffe3ecdb4bd980a7771a79c4b164ea454a4344ea6fc11840547e34708d5cc8f7a300f5f0129cef1ce9792b39ae7336fda144b53d2202fb5d53e08e0828381c5238e7be5aaf19f8a847c0129e68b10b0c2138e1a886ab7348013bae7fd1f969cd62764f21b3e48b0b70951db0cea30048a923501e6b799e5651fe69f01cde56076d36ceca695be49ef81a222b88a73791301c740c2bd39d904a3e8bbe6deaa1c08987c70b32d06b4ff5ce28a09f8e267c2595f553b40c913f31505c87b3c8e7e58bcc604a72a7c6067b30b3bbfd8165194cd5f5530f8f479b9929821b3fa8ae4f4012479c9519f529bf15790666a765171c22bd199ade52fec4a296a25f7c5babe92b8139cd504cd123c3e08ced2d91476e5c61dfc000a39bbb51bd92dcd9bc19cc582a347a6c13b23d3744cab2d572cddea122a0e92305f00e19983dc8c71e904e169f266cd754ae897071604d307852136e0d1246b54a8fb93fadb902a95b3c65a4f7aa0b58cd6f710a5ad1379f3ada111db9727342a6b130304919cd4456a2f17bc57527aaa9809398b4858557f13b20a923af3d2ed138a3851999f10d369efa48d0ff651368510e6a054a08803bf503664592d04159f0d922b2ff407497dc59cc82e9135553e726dd6c5ebf0c2052efceccf88a75c369bd0ab0971896ed221e9af24a9b9e37a5c4e14b971f893a0ed5ee8131ed15774d4516caea72702079c2e1cce770626dfde3bb350370ddaaa21ebb703aa01308e98453e2ec933f800813e45f1cb8c4f0f1afc36462722f1fe03aa1910d4a1e00db2990d83a0c0351c9b8faaf136a411002020511cf83cada62e14606bfc262bbec1848f0e777150f7846004958fbc75cc1aa32f46f1dfcee958faa8f677b13a921edb57ae82df086edeb170dcc0f525f802a6b79e78cf441f7f7b6a8e78823080d6111a0ecbd91aa2a22eef3c2c935d718f8c623724afc1967c7ebf167aad86b798cacd9d743725dae7b428809775b4cca85e6d3819240bd40ffb9eaee52b1abb5e590cd793d05139d99ae8926446f14cb73df36394e40281d3e92972e1e293e71d4509fa971c149c3969ce9c40248657d1b6db75a6898ec560fb83570e40191af5e3032e8cc58c3267e8ef5e2d27629742a381fe07e0858dcee19375e9bf0609a1b31eea41b106e6002824e26174f47bff092a73ee1612a6dfc661439e1bd3fe4a4a8a7613bdf66c38e628fd4101f33dfbff8c5ee15186c7dc4b7e019599f63081357c5d138da06aafda9eef9d39ed5d65932802dcd90ce558f1dc7f6ff05526da9c29942beab84801e96ed15cedcc1918dd271fe1d35f3cd9820013a7803b59058967f261ba6287f0ccf95fcb06847ec83e77e11667e5c6ebc24b50b5c2e0c7cfacef0a0c5e8f3bebcc52f02990c323f5eaa1652d12e404436bd5dc65525a7b8508d79273684ef22661f81fc31867a3cebd9aaa829bdc65d29dc3fca056c494e9fce5d07df00654612829158c647e8c87cba9ef1f4fcbba2e53b777068a5efe68edadf38775b2a7767d063d2fcc396357b66c90e2d452f444e83b42b4b9e9c8cc6bb7d19af11eaed4fb95d849c5fab139fe9ac284ed681857efe9d3fe71908b833a2e5592da510705213c498de5a9112db87ca47f048ca415c8eb72917e469ff77317c8c311f6a77502e2122380f075462cb821d0d990e75d61546af788ac8d9da7ec9f9032cae49dde178fd01d4d55fc35cf59d230a3bb8299c370100598a3591fecfac11fd5c3785c9f0c46dabbe36d874b68da517d0fb6565bca735a109a350ff86d3e48b5873232a7016fc2c4e908e740fc4134ffcb70e57773cd4ad0006e9c5a0ee2a875c31afb1e5b7155226cf25734fff488c4164fffd70f40a71fdde594a33dc07088a45517e61cbef7d7153c5b5041d889f786909fefe820c2b457a861b003acf7718b5e13857c663b10ba7ea8e15d5a29b67eaa5853a31862dff0953c2d2788101fcf01474e17fa6108d22f0438353617671fe99997250994ee4bc44ca2be5586eb8ccd39ab4ce686f946a821e605dfd6b8d56ed646812df77e3bbfd1a2cbdfc746c8cd865e956cebc5a78d2a05cdf016f9a62f1bdfad29c74dce8b7992e3e7729b5296208960a9fd63fe368222c8d3cd052db454dc0efd9b00967f971b7752929a7ff82427b7b83f7329785d2eda409e848e0933464f82ab1bca7370daa1b6a4bcf0976944437952c8983ee67d7176c76f6185654bd31d521cf219e262415e83c3afe3a2f0019f04cb14c787f9d050a575cb0f2af34c6f18735c1e13edc4aa267c1de889bfb30188668314420c339f885c4329210f25d22bcff9b764785e4d617d17a7d36de00897ee66bb3f2c4c7653ca4e23b9bf54a2585f70bfddf7c0abe9bfdd9defd6c6f243f7460130dc8592a87b2f75087c6005d04ec6b15ff381f6fd858dd103af8f4628a8b83a599326b948e09db8b7595d07fc7649e1bc7f97a8421effc86c656d92d2d87b87081d12e87417b01b81931bdff09d5a714d4be6daca757a309766008fed1047c237b9ec50e27af8e14d8f1f3f64cd11d065fdbf0c0a82226d21c3176ccf0118ff43caacd2595f3e895bda554912f522b82ae03f914b8ae7bd247291aed8368a79654a3c93dc937a053e6c635bb09f0024bff43718052ca8feb72b630f34027b445e0f2ff9a9f1ec035ffc8cfdd188d41f6f50eedb144b763f487c817af597c251ec646de61178cd167fe3ad872774d4fa5e7decbdfef820650ad67d4c796e9ccc101fd04aa270507d8cd7f688a79a9fa7b134887c0434d943fa85e39c158acd6f92bc4eaaac7c2fe525a7c7f225183ef567801b36d918e1e507ce53bf0fcfa64e1af1b6af0f6207985f916e01811d9cc72ac67398d301e4eac7cd7aa1d836457c58532abd93a0e351761894f70e29cf19640399b496ab477e40e3fc0b050b5b3bd633edd606b1b23d4ccfecdfba9d8d929227b11f6dacf65f13bc8353ac102ca4dbf3b40c96793f3b99336f2caf6eb52295dc9dcf2e5b8b9f2df524a2ced9175e529935d59d9436db4506ad0e2bfe76ec1e00c5d3b599895647a376dec66ac6bb9de1c6b54a75d1dc8a1c9ad497e7b1a5b32ec2f1aac15b6f078082b2523c3c5bf32ecd9233ca074a59574596bfd68dafb9d4c9f6c6c058d93c"}, 0xfd1, 0x0) 00:45:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) uname(&(0x7f0000000140)=""/12) 00:45:27 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_sigaction(0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)="36f2adf36d47f64755b2c4a1781191d0ebd76ff30fae26260f988900080000dbab56256b88c463216d1f54dfd767362ef344a7", {}, 0x0, &(0x7f0000000240)="3667450fb2b6020000000f537a170faeb6000000000f1b910800000066410f38209a68cfabdcc4416df96663c4217a705600f2c42289905429dbc422713964b2002edf7ab7"}, 0x0, 0x0) [ 324.357682] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:45:27 executing program 0: socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x64, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 00:45:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x1}, 0x4) 00:45:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 00:45:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x1}, 0x4) syz_emit_ethernet(0x118, &(0x7f0000000000)={@remote, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @local={0xac, 0x14, 0x223}, @empty, @remote}}}}, 0x0) 00:45:27 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000040)=0x5, 0x4) sendmmsg(r0, &(0x7f0000000000), 0x400000000000195, 0x0) 00:45:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040)=0x100000001, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000100)=0xffffffffffffff2a) 00:45:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0x1e, 0x4) r1 = socket$netlink(0x10, 0x3, 0x8000000004) sendmsg$nl_generic(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={0x0}}, 0x0) 00:45:27 executing program 2: 00:45:27 executing program 3: 00:45:27 executing program 5: [ 324.828414] print_req_error: I/O error, dev loop0, sector 0 [ 324.834704] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 324.850090] print_req_error: I/O error, dev loop0, sector 8 [ 324.856012] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 324.863990] print_req_error: I/O error, dev loop0, sector 16 [ 324.869866] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 324.878613] print_req_error: I/O error, dev loop0, sector 24 [ 324.884591] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 324.892390] print_req_error: I/O error, dev loop0, sector 32 [ 324.898287] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 324.906083] print_req_error: I/O error, dev loop0, sector 40 [ 324.912068] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 324.919774] print_req_error: I/O error, dev loop0, sector 48 00:45:27 executing program 0: 00:45:27 executing program 5: 00:45:27 executing program 3: [ 324.926832] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 324.935510] print_req_error: I/O error, dev loop0, sector 56 [ 324.941495] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 324.949165] print_req_error: I/O error, dev loop0, sector 64 [ 324.955958] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 324.963743] print_req_error: I/O error, dev loop0, sector 72 [ 324.969620] Buffer I/O error on dev loop0, logical block 9, lost async page write 00:45:27 executing program 2: 00:45:27 executing program 4: 00:45:27 executing program 5: 00:45:28 executing program 1: 00:45:28 executing program 3: 00:45:28 executing program 2: 00:45:28 executing program 0: 00:45:28 executing program 5: 00:45:28 executing program 4: 00:45:28 executing program 5: 00:45:28 executing program 2: 00:45:28 executing program 0: 00:45:28 executing program 3: 00:45:28 executing program 4: 00:45:28 executing program 1: 00:45:28 executing program 5: 00:45:28 executing program 3: 00:45:28 executing program 2: 00:45:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth0_to_team\x00', 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @loopback}, 0x10) socketpair$unix(0x1, 0x20800000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x8000400) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x529540f5, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000080)=0xb1f, 0x4) 00:45:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}, [0x0, 0xfffffffe]}, 0x10) 00:45:28 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000140)) time(0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 00:45:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", 0x0, 0x69}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:45:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x3}], 0x1, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 326.018296] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:45:28 executing program 2: accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ip_vti0\x00', 0x10) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) 00:45:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) getpgid(0x0) munlockall() 00:45:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:28 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x40000100000402, &(0x7f0000000340)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 00:45:29 executing program 3: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[{@discard='discard'}]}) [ 326.496753] gfs2: not a GFS2 filesystem [ 326.545992] gfs2: not a GFS2 filesystem 00:45:29 executing program 4: 00:45:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000040)='./file0\x00', 0x0) getresgid(0x0, 0x0, 0x0) chown(0x0, 0x0, 0x0) 00:45:29 executing program 5: 00:45:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x0, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 00:45:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", &(0x7f0000000140), &(0x7f0000001580)) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 00:45:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6(0xa, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000001800120008000100736974000c00020008000400f04c45ded5fe96f93efdfd11500f95a4ac7e9f714caae2a524d71dbf60ecef6d9038df9a09cda90d0881281c94ffdd5f775cb68ec4d24bd08a", @ANYRES32=0x0], 0x2}}, 0x0) 00:45:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)="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", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc020660b, 0x730080) 00:45:30 executing program 2: 00:45:30 executing program 5: 00:45:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:30 executing program 4: 00:45:30 executing program 3: 00:45:30 executing program 1: 00:45:30 executing program 5: 00:45:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt6_stats\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 00:45:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000580)="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") sendfile(r0, r1, 0x0, 0x800) 00:45:30 executing program 2: timer_create(0x2, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x1, 0x0, 0x0) 00:45:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:30 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x1, 0x0) write$smack_current(r0, 0x0, 0x0) 00:45:30 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000200)=[@register_looper], 0x0, 0x0, 0x0}) 00:45:30 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x14, 0x0, &(0x7f0000000200)=[@increfs_done={0x40106308, 0x0, 0x2}], 0x0, 0x0, 0x0}) 00:45:30 executing program 4: [ 328.106185] binder: 11592:11593 ERROR: BC_REGISTER_LOOPER called without request 00:45:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'team_slave_1\x00', 0x4fff}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000380)=0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 00:45:30 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/uhid\x00', 0x802, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getresuid(&(0x7f0000000580), 0x0, &(0x7f0000000840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000340)=""/164, &(0x7f0000000180)=0xa4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x8) write$cgroup_type(r2, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x7fff, 0x0) fallocate(r2, 0x3, 0x0, 0x6) ioprio_set$uid(0x0, r0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 00:45:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) [ 328.251359] binder: 11600:11602 BC_INCREFS_DONE u0000000000000000 no match 00:45:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000)=0x10, 0x4) [ 328.332669] binder: 11600:11611 BC_INCREFS_DONE u0000000000000000 node 1 cookie mismatch 0000000000000002 != 0000000000000000 [ 328.380707] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:45:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @broadcast}, {0x0, @random="79d2106aa561"}, 0x0, {0x2, 0x0, @remote}, "0000407100eeffffff00000000000200"}) 00:45:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), 0x4) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) write$apparmor_current(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={@mcast2, @mcast1, @local, 0x80000001, 0x8, 0x7, 0x0, 0x9, 0x100008, r2}) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x41) lseek(r3, 0x0, 0x4) close(r3) io_submit(0x0, 0x0, 0x0) [ 328.421823] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:45:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000000)={0x10}) 00:45:31 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0, 0x0) poll(&(0x7f0000000380)=[{r0}], 0x1, 0x7f) [ 328.615982] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:45:31 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd, 0x4000000000d7}}) 00:45:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, &(0x7f00000007c0)={[{@fat=@umask={'umask'}}], [{@euid_gt={'euid>'}}]}) 00:45:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:31 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$BLKIOOPT(r1, 0x1279, 0x0) 00:45:31 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x5, 0x0, 0xffffffffffffffff}}) 00:45:31 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000300)='/dev/snd/timer\x00', 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/110, 0x6e}], 0x1) 00:45:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, &(0x7f00000007c0)={[{@fat=@umask={'umask'}}]}) 00:45:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, &(0x7f00000007c0)={[{@fat=@umask={'umask'}}], [{@euid_gt={'euid>'}}]}) 00:45:31 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000300)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000000)={{}, 0x0, 0x0, 'id0\x00', 'timer1\x00'}) 00:45:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) connect$unix(r1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)=0x0) rt_tgsigqueueinfo(r2, r3, 0x14, &(0x7f0000000240)={0x10, 0xb5, 0x6, 0xfffffffffffff0d4}) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='./file1/file0\x00') r4 = add_key(&(0x7f0000000500)='syzkaller\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000600)="b98dbbe964d7719d69e2f9c9a32813d86f26868adffac5634ad6752cc09e87d67362b937ac944130e9e39719cab2178a4fff7b79f12c2f4382b55a18d2da62c477a1352793e7e86468e68b428f6315b70bda9967d3f590b33516cbbbd51d9205f81583feeca5245c0b84d532761e0699083cacf31c088d87f29acfad3cca481305740f91ce33e3394e8ace", 0x8b, 0xfffffffffffffffc) request_key(&(0x7f0000000700)='dns_resolver\x00', &(0x7f0000000740)={'syz', 0x0}, &(0x7f0000000480)='\x00', r4) clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$VT_WAITACTIVE(r5, 0x5607) r6 = syz_open_procfs(0x0, &(0x7f0000000900)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r7 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x86100) r8 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) fcntl$setown(r8, 0x8, r9) inotify_init() sendfile(r7, r6, 0x0, 0x100000005) 00:45:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 00:45:31 executing program 1: r0 = socket(0x10, 0x100000003, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x1c, 0x1a, 0x201, 0x0, 0x0, {}, [@generic="de03942130"]}, 0x1c}}, 0x0) 00:45:32 executing program 2: 00:45:32 executing program 2: 00:45:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 00:45:32 executing program 1: 00:45:32 executing program 5: 00:45:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, &(0x7f00000007c0)={[{@fat=@umask={'umask'}}], [{@euid_gt={'euid>'}}]}) 00:45:32 executing program 2: 00:45:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 00:45:32 executing program 1: 00:45:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) connect$unix(r1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)=0x0) rt_tgsigqueueinfo(r2, r3, 0x14, &(0x7f0000000240)={0x10, 0xb5, 0x6, 0xfffffffffffff0d4}) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='./file1/file0\x00') r4 = add_key(&(0x7f0000000500)='syzkaller\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000600)="b98dbbe964d7719d69e2f9c9a32813d86f26868adffac5634ad6752cc09e87d67362b937ac944130e9e39719cab2178a4fff7b79f12c2f4382b55a18d2da62c477a1352793e7e86468e68b428f6315b70bda9967d3f590b33516cbbbd51d9205f81583feeca5245c0b84d532761e0699083cacf31c088d87f29acfad3cca481305740f91ce33e3394e8ace", 0x8b, 0xfffffffffffffffc) request_key(&(0x7f0000000700)='dns_resolver\x00', &(0x7f0000000740)={'syz', 0x0}, &(0x7f0000000480)='\x00', r4) clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$VT_WAITACTIVE(r5, 0x5607) r6 = syz_open_procfs(0x0, &(0x7f0000000900)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r7 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x86100) r8 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) fcntl$setown(r8, 0x8, r9) inotify_init() sendfile(r7, r6, 0x0, 0x100000005) 00:45:32 executing program 2: 00:45:32 executing program 1: 00:45:32 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 00:45:32 executing program 5: 00:45:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, &(0x7f00000007c0)={[{@fat=@umask={'umask'}}], [{@euid_gt={'euid>'}}]}) 00:45:33 executing program 1: 00:45:33 executing program 5: 00:45:33 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 00:45:33 executing program 2: 00:45:33 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, &(0x7f00000007c0)={[{@fat=@umask={'umask'}}], [{@euid_gt={'euid>'}}]}) 00:45:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@alu={0x8000000201a7f2f, 0xb7, 0x2}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) 00:45:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000300)) setsockopt$sock_attach_bpf(r1, 0x6, 0x11, &(0x7f0000000200), 0x48b) 00:45:33 executing program 2: r0 = socket$kcm(0x10, 0x800400000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000001600816c63cc940b72eb1a040a485e510befccd77f3e9cf0758ef9050600b0eba06ac400040002000000", 0x2e}], 0x1}, 0x0) 00:45:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000300)) setsockopt$sock_attach_bpf(r1, 0x6, 0x16, &(0x7f0000000200), 0x48b) 00:45:33 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 00:45:33 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, &(0x7f00000007c0)={[{@fat=@umask={'umask'}}], [{@euid_gt={'euid>'}}]}) 00:45:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@alu={0x8000000201a7f2f, 0xb7, 0x2}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) 00:45:33 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 331.147200] __nla_parse: 8 callbacks suppressed [ 331.147211] netlink: 22 bytes leftover after parsing attributes in process `syz-executor2'. 00:45:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7cf, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:45:33 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000003980)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000080)={0x0, 0x0}) socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 00:45:33 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x8044, &(0x7f00000007c0)={[{@fat=@umask={'umask'}}], [{@euid_gt={'euid>'}}]}) 00:45:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 00:45:34 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 331.368999] audit: type=1326 audit(1543884334.053:10561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11802 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mq_notify(0xffffffffffffffff, 0x0) 00:45:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x8044, &(0x7f00000007c0)={[{@fat=@umask={'umask'}}], [{@euid_gt={'euid>'}}]}) 00:45:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000003380)=[{0x6, 0x0, 0x0, 0xffffffff}]}) timer_delete(0x0) 00:45:34 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x2}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) 00:45:34 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 00:45:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 331.643766] audit: type=1326 audit(1543884334.333:10562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11823 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 331.713892] audit: type=1326 audit(1543884334.403:10563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11831 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x8044, &(0x7f00000007c0)={[{@fat=@umask={'umask'}}], [{@euid_gt={'euid>'}}]}) 00:45:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 00:45:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 331.913211] audit: type=1326 audit(1543884334.603:10564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11851 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:34 executing program 1: unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:45:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x8044, &(0x7f00000007c0)={[{@fat=@umask={'umask'}}], [{@euid_gt={'euid>'}}]}) [ 332.169652] audit: type=1326 audit(1543884334.853:10565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11802 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 332.431268] audit: type=1326 audit(1543884335.113:10566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11823 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:35 executing program 4: 00:45:35 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 00:45:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[{@fat=@umask={'umask'}}], [{@euid_gt={'euid>'}}]}) 00:45:35 executing program 1: 00:45:35 executing program 5: [ 332.506692] audit: type=1326 audit(1543884335.193:10567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11831 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:35 executing program 1: 00:45:35 executing program 5: [ 332.630685] FAT-fs (loop3): Unrecognized mount option "euid>00000000000000000000" or missing value 00:45:35 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 332.690711] audit: type=1326 audit(1543884335.373:10568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=11851 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:35 executing program 2: 00:45:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000300), 0x0) write(r1, &(0x7f00000001c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 00:45:35 executing program 1: 00:45:35 executing program 5: 00:45:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:45:35 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 00:45:35 executing program 2: 00:45:35 executing program 1: 00:45:35 executing program 4: 00:45:35 executing program 5: 00:45:35 executing program 1: 00:45:35 executing program 2: [ 333.091953] FAT-fs (loop3): bogus number of reserved sectors 00:45:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:35 executing program 4: 00:45:35 executing program 1: [ 333.152744] FAT-fs (loop3): Can't find a valid FAT filesystem 00:45:35 executing program 5: 00:45:36 executing program 4: 00:45:36 executing program 2: 00:45:36 executing program 1: 00:45:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:45:36 executing program 5: 00:45:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:36 executing program 1: 00:45:36 executing program 5: 00:45:36 executing program 4: 00:45:36 executing program 2: [ 333.512214] FAT-fs (loop3): bogus number of reserved sectors [ 333.544470] FAT-fs (loop3): Can't find a valid FAT filesystem 00:45:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:36 executing program 5: 00:45:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:45:36 executing program 2: 00:45:36 executing program 4: 00:45:36 executing program 1: 00:45:36 executing program 5: [ 333.849502] FAT-fs (loop3): bogus number of reserved sectors 00:45:36 executing program 1: 00:45:36 executing program 2: 00:45:36 executing program 4: 00:45:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 333.922704] FAT-fs (loop3): Can't find a valid FAT filesystem 00:45:36 executing program 5: 00:45:36 executing program 4: 00:45:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="180000e2ff2000002000000000ffffff"], 0x0, 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) 00:45:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ftruncate(0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x80000}) 00:45:36 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) fdatasync(r2) 00:45:36 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) fdatasync(r4) ftruncate(r5, 0x8200) write$UHID_CREATE(r2, &(0x7f0000000340)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}, 0x120) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r4}) r6 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x8000fffffffe) 00:45:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'team_slave_1\x00', 0x4fff}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) poll(&(0x7f0000000380)=[{r0}], 0x1, 0x5) 00:45:37 executing program 1: nanosleep(&(0x7f0000000280), 0x0) 00:45:37 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000300)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000340)) 00:45:37 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @broadcast}, {}, 0xc, {0x2, 0x0, @loopback}, 'syz_tun\x00'}) 00:45:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f00000000c0)) [ 334.426426] device lo left promiscuous mode 00:45:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:37 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x8000}) 00:45:37 executing program 1: io_setup(0xb89, &(0x7f00000000c0)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) [ 334.522413] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:45:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000000000)="98", 0x1, 0x0, 0x0, 0x0) 00:45:37 executing program 2: socket$netlink(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x6, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, {0x2, 0x4e20, @rand_addr=0x80000000}, {0x2, 0x4e22, @loopback}, 0x2, 0x8000, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x3, 0x8144}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(0xffffffffffffffff, 0x40b) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280), 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x1000000000000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 334.635939] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:45:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x63, &(0x7f0000000040)=0x0) io_destroy(r0) 00:45:37 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x3c, 0x0, &(0x7f0000000200)=[@increfs_done={0x40106308, 0x0, 0x2}, @enter_looper, @register_looper, @acquire_done, @free_buffer], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) close(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 00:45:37 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, 0x0) 00:45:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:37 executing program 1: r0 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r0) 00:45:37 executing program 2: socket$netlink(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x6, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, {0x2, 0x4e20, @rand_addr=0x80000000}, {0x2, 0x4e22, @loopback}, 0x2, 0x8000, 0x8, 0x0, 0x8b, 0x0, 0x0, 0x3, 0x8144}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(0xffffffffffffffff, 0x40b) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280), 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x1000000000000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 334.891545] binder: 12046:12050 BC_INCREFS_DONE u0000000000000000 node 2 cookie mismatch 0000000000000002 != 0000000000000000 00:45:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 334.941004] binder: 12046:12050 ERROR: BC_REGISTER_LOOPER called after BC_ENTER_LOOPER 00:45:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 00:45:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 334.984744] binder: 12046:12050 BC_ACQUIRE_DONE node 2 has no pending acquire request [ 335.036751] binder: 12046:12050 BC_FREE_BUFFER u0000000000000000 no match 00:45:37 executing program 5: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x10000) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141442, 0x0) mmap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x800002, 0x11, r3, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) pread64(r4, &(0x7f0000005000)=""/4096, 0xb8, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 335.090752] binder: 12046:12058 BC_INCREFS_DONE u0000000000000000 no match [ 335.120137] binder: BINDER_SET_CONTEXT_MGR already set [ 335.135165] binder: 12046:12058 ERROR: BC_REGISTER_LOOPER called after BC_ENTER_LOOPER 00:45:37 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000000c0)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 00:45:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 335.161185] binder: 12046:12050 ioctl 40046207 0 returned -16 [ 335.186617] binder: 12046:12058 BC_ACQUIRE_DONE u0000000000000000 no match 00:45:37 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) io_setup(0x1f, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000002600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 335.213388] audit: type=1804 audit(1543884337.903:10569): pid=12078 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir066628889/syzkaller.6QfNuJ/228/bus" dev="sda1" ino=17194 res=1 [ 335.231580] binder: 12046:12058 BC_FREE_BUFFER u0000000000000000 no match 00:45:38 executing program 3: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x1000000000000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 00:45:38 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xee6e, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 00:45:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0xf) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000000c0)=""/152) 00:45:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:38 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000800)="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", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) 00:45:38 executing program 1: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000008, &(0x7f0000000100)) r0 = gettid() timer_create(0x0, &(0x7f0000ee4000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000d64000)) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x13) socketpair$unix(0x1, 0x0, 0x0, 0x0) 00:45:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:38 executing program 4: socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x200000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000240)) renameat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) [ 336.339085] audit: type=1804 audit(1543884339.023:10570): pid=12128 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir066628889/syzkaller.6QfNuJ/228/bus" dev="sda1" ino=17194 res=1 00:45:39 executing program 5: 00:45:39 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x8000fffffffe) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 00:45:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f000078b000)={0xfffffffffffffffa}, 0x0, 0x8) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) writev(r1, &(0x7f0000000a80)=[{&(0x7f0000000280)='Q', 0x1}], 0x1) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000040), 0x8}) 00:45:39 executing program 4: 00:45:39 executing program 2: 00:45:39 executing program 4: [ 336.495455] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:45:39 executing program 5: 00:45:39 executing program 5: 00:45:41 executing program 1: 00:45:41 executing program 4: 00:45:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:41 executing program 2: 00:45:41 executing program 3: 00:45:41 executing program 5: 00:45:41 executing program 2: 00:45:41 executing program 4: r0 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) recvmmsg(r0, &(0x7f0000001cc0), 0x4000000000002c0, 0x0, &(0x7f0000001540)={r1}) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 00:45:41 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x8, 0x2f, 0x0, @dev, @mcast2, {[], @udp={0x29, 0x0, 0x8}}}}}}, 0x0) 00:45:41 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000004c0)={0x20}) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000380)="d9", 0x1}], 0x1) 00:45:41 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x3}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000200)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x2776b2db6683a841) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000500)=@abs={0x1}, 0x6e) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x6}, &(0x7f0000000340)=0xc) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x230, &(0x7f0000007000)={@local, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x222, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={r1}, 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f00000007c0)={'security\x00'}, &(0x7f0000000840)=0x54) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)=ANY=[], &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) clock_gettime(0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000880)={r1, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000000640)=0x84) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x360, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 00:45:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:41 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2, 0x4}, 0x1c) getpeername(r0, 0x0, &(0x7f0000000100)) 00:45:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x400) fstat(r1, &(0x7f0000000080)) 00:45:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:45:41 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ptrace$cont(0x1f, r1, 0x0, 0x0) 00:45:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x1) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001600)="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", 0x5a9}], 0x1}, 0x0) [ 339.220380] kauditd_printk_skb: 3 callbacks suppressed [ 339.220415] audit: type=1326 audit(1543884341.903:10574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12202 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 339.682172] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 339.689203] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:45:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) 00:45:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="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") readahead(r0, 0x0, 0x0) 00:45:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x0, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 339.849322] audit: type=1326 audit(1543884342.533:10575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12226 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 339.915053] audit: type=1326 audit(1543884342.583:10576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12231 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 339.966193] audit: type=1326 audit(1543884342.633:10577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12202 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:42 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @broadcast}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'team0\x00'}) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x4) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2000005) pwritev(r0, &(0x7f0000000300)=[{&(0x7f0000001000)="019e19a5feed9c74a604099765cced74be7be6d957336e4c", 0x18}], 0x1, 0x8) listxattr(0x0, &(0x7f00000013c0)=""/21, 0x15) ioctl$LOOP_CLR_FD(r0, 0x4c01) 00:45:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x0, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) clone(0x202102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) 00:45:42 executing program 5: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @broadcast}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'team0\x00'}) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x4) pwritev(r0, &(0x7f0000000300), 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) pwritev(r0, &(0x7f0000000300)=[{&(0x7f0000001000)="019e19a5feed9c74a604099765cced74be7be6d957336e4c63dd2a9d55bd87", 0x1f}], 0x1, 0x8) listxattr(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 340.257078] audit: type=1326 audit(1543884342.943:10578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12241 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:43 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @broadcast}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'team0\x00'}) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x4) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2000005) pwritev(r0, &(0x7f0000000300)=[{&(0x7f0000001000)="019e19a5feed9c74a604099765cced74be7be6d957336e4c", 0x18}], 0x1, 0x8) listxattr(0x0, &(0x7f00000013c0)=""/21, 0x15) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 340.552779] print_req_error: 120 callbacks suppressed [ 340.552790] print_req_error: I/O error, dev loop0, sector 0 [ 340.564086] buffer_io_error: 120 callbacks suppressed [ 340.564096] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 340.577385] print_req_error: I/O error, dev loop0, sector 8 [ 340.583198] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 340.590864] print_req_error: I/O error, dev loop0, sector 16 [ 340.597055] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 340.604805] print_req_error: I/O error, dev loop0, sector 24 [ 340.610616] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 340.618656] print_req_error: I/O error, dev loop0, sector 32 [ 340.624838] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 340.625829] print_req_error: I/O error, dev loop0, sector 40 [ 340.632897] print_req_error: I/O error, dev loop0, sector 48 [ 340.638447] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 340.638502] print_req_error: I/O error, dev loop0, sector 56 [ 340.644340] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 340.651987] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 340.658283] print_req_error: I/O error, dev loop0, sector 64 [ 340.665463] print_req_error: I/O error, dev loop0, sector 72 [ 340.673381] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 340.678924] Buffer I/O error on dev loop0, logical block 9, lost async page write [ 340.700278] audit: type=1326 audit(1543884343.383:10579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12231 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:43 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @broadcast}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'team0\x00'}) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x4) pwritev(r0, 0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) pwritev(r0, &(0x7f0000000300)=[{&(0x7f0000001000)="019e19a5feed9c74a604099765cced74be7be6d957336e4c63dd2a9d55bd87", 0x1f}], 0x1, 0x8) listxattr(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 340.774499] audit: type=1326 audit(1543884343.463:10580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12226 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:43 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) close(r0) 00:45:43 executing program 5: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f00000003c0)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 00:45:43 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @broadcast}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'team0\x00'}) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x4) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2000005) listxattr(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) ioctl$LOOP_CLR_FD(r0, 0x4c01) 00:45:43 executing program 2: [ 341.026843] binder: 12277:12279 got transaction to invalid handle [ 341.048173] binder: 12277:12279 transaction failed 29201/-22, size 0-0 line 2834 [ 341.057223] audit: type=1326 audit(1543884343.743:10581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12251 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:43 executing program 2: 00:45:43 executing program 3: [ 341.114616] binder_alloc: binder_alloc_mmap_handler: 12277 20001000-20004000 already mapped failed -16 00:45:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:45:43 executing program 5: 00:45:43 executing program 2: 00:45:43 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @broadcast}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'team0\x00'}) setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x4) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2000005) listxattr(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) ioctl$LOOP_CLR_FD(r0, 0x4c01) 00:45:43 executing program 3: 00:45:44 executing program 4: 00:45:44 executing program 5: 00:45:44 executing program 2: 00:45:44 executing program 3: 00:45:44 executing program 1: [ 342.052511] binder: undelivered TRANSACTION_ERROR: 29201 00:45:44 executing program 5: 00:45:44 executing program 1: 00:45:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 00:45:45 executing program 2: 00:45:45 executing program 3: 00:45:45 executing program 4: 00:45:45 executing program 5: 00:45:45 executing program 1: 00:45:45 executing program 1: pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 00:45:45 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) write$apparmor_current(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 00:45:45 executing program 2: 00:45:45 executing program 5: 00:45:45 executing program 4: 00:45:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 00:45:45 executing program 2: 00:45:45 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000380)='./file0/bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f00000003c0)="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", 0x147, 0x0) 00:45:45 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) 00:45:45 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffd7a) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='pipefs\x00', 0x0, 0x0) 00:45:46 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0x0, 0x802) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x82) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f00000006c0)=""/227) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0xaf14113f02c18c41, 0x0, &(0x7f0000000680)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000), 0x0, 0xfffffdfd, 0x0}) 00:45:46 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) [ 343.483372] binder: 12366:12370 Acquire 1 refcount change on invalid ref 0 ret -22 [ 343.516299] binder: 12366:12370 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 343.537488] binder: 12366:12370 ioctl c0306201 2000dfd0 returned -11 [ 343.570109] binder: 12366:12375 Acquire 1 refcount change on invalid ref 0 ret -22 00:45:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getflags(r0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x1000000000000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(r2, 0x0) preadv(r3, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 343.598157] binder: 12366:12370 unknown command 536872576 [ 343.622674] binder: 12366:12370 ioctl c0306201 20008fd0 returned -22 00:45:46 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000040)) 00:45:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{0x7, 0x5, 0x1800}], 0x1, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 00:45:46 executing program 5: faccessat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) 00:45:46 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 00:45:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 00:45:46 executing program 2: socket$netlink(0x10, 0x3, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 00:45:46 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x0, 0x0, 0x0}) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x1, 0x0, &(0x7f00000001c0)="10"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, 0x0}) 00:45:46 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000000, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 00:45:47 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000000, 0x20000000002, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x6017d4fe31a9ddf1) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 344.342058] binder: 12406:12409 tried to acquire reference to desc 0, got 1 instead [ 344.351808] rpcbind: RPC call returned error 22 00:45:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x0, 0x0, &(0x7f0000000200)) 00:45:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 344.420551] binder: 12406:12417 unknown command 0 [ 344.446097] rpcbind: RPC call returned error 22 00:45:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb9fd7ee353348005144d8a5eb8e") flistxattr(r1, 0x0, 0x0) [ 344.493306] binder: 12406:12417 ioctl c0306201 20008fd0 returned -22 [ 344.518305] binder: undelivered death notification, 0000000000000000 00:45:47 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 00:45:47 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 00:45:47 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) fchmod(r0, 0x0) 00:45:47 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 00:45:47 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/77) 00:45:47 executing program 2: add_key$user(&(0x7f0000000ac0)='user\x00', &(0x7f0000000b00)={'syz', 0x1}, &(0x7f0000000b40)="ef", 0x1, 0xfffffffffffffffb) 00:45:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd(0x20) 00:45:47 executing program 1: getrandom(&(0x7f00000001c0)=""/140, 0x8c, 0x2) 00:45:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @dev}, 0x10) 00:45:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) 00:45:47 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0x224}, 0x43c5) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) fdatasync(r4) ftruncate(r5, 0x8200) write$UHID_CREATE(r2, &(0x7f0000000340)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x0}, 0x120) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r4}) r6 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x8000fffffffe) 00:45:47 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x12040, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pwrite64(r1, &(0x7f0000000040)="43a8e685a75e9389bb723e6f97120ffa8a4f9327b3583a6bf3b6ae600d986c43a591", 0x22, 0x0) write$apparmor_current(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000a36000/0x4000)=nil, 0x4000, 0x8, 0x6050, 0xffffffffffffffff, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10001) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r3, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffe14) 00:45:48 executing program 3: 00:45:48 executing program 1: r0 = socket$inet6(0xa, 0x400000000002, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) 00:45:48 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) 00:45:48 executing program 5: 00:45:48 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 00:45:48 executing program 5: 00:45:48 executing program 3: 00:45:48 executing program 1: 00:45:48 executing program 5: 00:45:48 executing program 3: 00:45:48 executing program 1: 00:45:48 executing program 0: 00:45:48 executing program 2: 00:45:48 executing program 5: 00:45:48 executing program 4: 00:45:48 executing program 3: 00:45:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:45:48 executing program 4: 00:45:48 executing program 5: 00:45:48 executing program 3: 00:45:48 executing program 2: 00:45:48 executing program 1: 00:45:48 executing program 0: 00:45:49 executing program 2: 00:45:49 executing program 4: 00:45:49 executing program 3: 00:45:49 executing program 1: 00:45:49 executing program 5: 00:45:49 executing program 0: 00:45:49 executing program 2: 00:45:49 executing program 4: 00:45:49 executing program 1: 00:45:49 executing program 3: 00:45:49 executing program 0: 00:45:49 executing program 5: 00:45:49 executing program 3: 00:45:49 executing program 2: 00:45:49 executing program 4: 00:45:49 executing program 5: 00:45:49 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x1, 0x0) 00:45:49 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x6, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast1, 0x6}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 00:45:49 executing program 2: 00:45:49 executing program 4: 00:45:49 executing program 3: 00:45:49 executing program 2: 00:45:49 executing program 0: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) epoll_create1(0x80000) epoll_create1(0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0) r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) exit(0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1cde) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000400)) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000000480)='TRUE', 0x4, 0x2) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001bc0)=ANY=[], 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000500)={@multicast2, @remote}, 0x0) 00:45:49 executing program 5: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x7fc, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) rmdir(0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) syslog(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000740)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r1, r2, 0x0, 0x100000001) getresgid(&(0x7f00000017c0), 0x0, &(0x7f0000005400)) 00:45:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) r1 = socket$inet(0x2, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) dup2(r1, r2) 00:45:49 executing program 1: rmdir(&(0x7f0000001700)='./file0\x00') 00:45:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x8000fffffffe) 00:45:49 executing program 2: r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 00:45:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade315a544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") semop(0x0, 0x0, 0x0) semget$private(0x0, 0x1004, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0xc020660b, 0x72fffd) 00:45:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000500)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0x683}) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f00000002c0)={[{0x8}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:45:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) pipe2(&(0x7f0000000580), 0x0) connect$inet(r0, &(0x7f0000000180), 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000240)=[@mss, @mss, @mss, @mss, @mss, @mss], 0x37c) 00:45:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x2, 0x0, &(0x7f0000000040)) 00:45:50 executing program 3: syz_open_procfs(0x0, 0x0) semget$private(0x0, 0x1004, 0x0) 00:45:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 00:45:50 executing program 5: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x7fc, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) rmdir(0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) syslog(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000740)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r1, r2, 0x0, 0x100000001) getresgid(&(0x7f00000017c0), 0x0, &(0x7f0000005400)) 00:45:50 executing program 0: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x7fc, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) rmdir(0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) syslog(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000740)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r1, r2, 0x0, 0x100000001) getresgid(&(0x7f00000017c0), 0x0, &(0x7f0000005400)) 00:45:50 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000001, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000040)) 00:45:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="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") fadvise64(r0, 0x0, 0x0, 0x0) [ 347.522783] netlink: 7 bytes leftover after parsing attributes in process `syz-executor1'. 00:45:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) pivot_root(0x0, 0x0) 00:45:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 00:45:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) times(0x0) [ 347.742795] netlink: 7 bytes leftover after parsing attributes in process `syz-executor1'. [ 347.817853] audit: type=1326 audit(1543884350.503:10582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12656 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 347.870376] audit: type=1326 audit(1543884350.543:10583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12670 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 347.891800] audit: type=1326 audit(1543884350.553:10584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12672 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 347.983629] netlink: 7 bytes leftover after parsing attributes in process `syz-executor1'. 00:45:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) [ 348.186515] netlink: 7 bytes leftover after parsing attributes in process `syz-executor1'. 00:45:50 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 00:45:51 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 00:45:51 executing program 5: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x7fc, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) rmdir(0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) syslog(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000740)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r1, r2, 0x0, 0x100000001) getresgid(&(0x7f00000017c0), 0x0, &(0x7f0000005400)) 00:45:51 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-aesni-avx2\x00'}, 0x58) accept(r1, &(0x7f0000000180)=@nfc_llcp, 0x0) [ 348.479120] audit: type=1326 audit(1543884351.163:10585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12656 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:51 executing program 1: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 00:45:51 executing program 2: r0 = socket$inet6(0xa, 0x80803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 00:45:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) [ 348.649146] audit: type=1326 audit(1543884351.333:10586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=12672 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:51 executing program 4: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) epoll_create1(0x80000) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/attr/current\x00', 0x2, 0x0) sendto$unix(r0, &(0x7f00000000c0), 0x0, 0x20000000, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) r1 = dup(0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000000000712600000000000035060000ff000000bf25000000000000070500000e0000000f65000000000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d43010000000000950000000000000061540000000000006b25000000000000070500000e0000000f6500000000000027050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b7000000000000009500000000000000"], 0x0}, 0x48) dup(r1) exit(0x0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1cde) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) fsetxattr$security_smack_transmute(r2, &(0x7f0000000380)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000480)='TRUE', 0x4, 0x2) accept$inet(r2, &(0x7f0000000240)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001bc0)=ANY=[], 0x0) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000500)={@multicast2, @remote}, &(0x7f0000000540)=0x8) 00:45:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000140)={0x0, {0x0, 0x0, 0x4f}}) 00:45:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:45:51 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 00:45:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:45:51 executing program 2: time(&(0x7f0000000080)) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) epoll_create1(0x80000) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) sendto$unix(r0, &(0x7f00000000c0), 0x0, 0x20000000, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) r1 = dup(0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x807) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) dup(r1) exit(0x0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1cde) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) fsetxattr$security_smack_transmute(r2, &(0x7f0000000380)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000480)='TRUE', 0x4, 0x2) accept$inet(r2, &(0x7f0000000240)={0x2, 0x0, @dev}, &(0x7f0000000340)=0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001bc0)=ANY=[], 0x0) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000500)={@multicast2, @remote}, &(0x7f0000000540)=0x8) 00:45:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @local}, 0x10) sendto$inet(r0, &(0x7f0000000080)="c3", 0x1, 0x81, 0x0, 0x0) 00:45:52 executing program 4: 00:45:52 executing program 5: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x7fc, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) rmdir(0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) syslog(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000740)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r1, r2, 0x0, 0x100000001) getresgid(&(0x7f00000017c0), 0x0, &(0x7f0000005400)) 00:45:52 executing program 0: 00:45:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040), 0x0) 00:45:52 executing program 3: 00:45:52 executing program 4: 00:45:52 executing program 0: 00:45:52 executing program 3: 00:45:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040), 0x0) 00:45:52 executing program 4: 00:45:52 executing program 2: 00:45:52 executing program 0: 00:45:52 executing program 5: 00:45:52 executing program 3: 00:45:52 executing program 4: 00:45:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040), 0x0) 00:45:52 executing program 0: 00:45:52 executing program 2: 00:45:52 executing program 4: 00:45:52 executing program 3: 00:45:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 00:45:52 executing program 2: 00:45:52 executing program 0: 00:45:53 executing program 5: 00:45:53 executing program 4: 00:45:53 executing program 0: 00:45:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 00:45:53 executing program 2: 00:45:53 executing program 3: 00:45:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 00:45:53 executing program 5: 00:45:53 executing program 0: 00:45:53 executing program 4: 00:45:53 executing program 3: 00:45:53 executing program 2: 00:45:53 executing program 0: 00:45:53 executing program 5: 00:45:53 executing program 2: 00:45:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 00:45:53 executing program 4: 00:45:53 executing program 3: 00:45:53 executing program 0: 00:45:53 executing program 2: 00:45:53 executing program 5: 00:45:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 00:45:53 executing program 4: 00:45:53 executing program 3: 00:45:53 executing program 0: 00:45:53 executing program 2: 00:45:53 executing program 5: 00:45:53 executing program 4: 00:45:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f00000200", 0x12}], 0x1}, 0x0) 00:45:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0)={0x0, 0x7530}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 00:45:53 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, &(0x7f0000000100)={0xffffffff}, 0x8) 00:45:53 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) 00:45:53 executing program 5: add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 00:45:54 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='id_legacy\x00', 0x0, 0x0, r0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="d13ff3d776", 0x0) 00:45:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f00000200", 0x12}], 0x1}, 0x0) [ 351.359205] input: syz1 as /devices/virtual/input/input16 00:45:54 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="d13ff3d776", 0x0) 00:45:54 executing program 3: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) [ 351.422527] input: syz1 as /devices/virtual/input/input17 00:45:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000000200)={0x102c, 0x7fff}) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000180)=0x4, 0x4) 00:45:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f00000200", 0x12}], 0x1}, 0x0) 00:45:54 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) 00:45:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f2870108", 0x1b}], 0x1}, 0x0) 00:45:54 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x4) 00:45:54 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x40900, 0x42) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f00000003c0)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 00:45:54 executing program 2: request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 00:45:54 executing program 5: clone(0x8020500, 0x0, 0x0, 0x0, 0x0) 00:45:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f2870108", 0x1b}], 0x1}, 0x0) 00:45:54 executing program 0: r0 = socket(0x10, 0x100000003, 0x0) sendmsg$nl_generic(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x28, 0x1a, 0x201, 0x0, 0x0, {}, [@typed={0x14, 0x0, @ipv6=@dev}]}, 0x28}}, 0x0) 00:45:54 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000140)={0x11, 0x400000000200003}, 0x14) 00:45:54 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) dup2(r1, r0) 00:45:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f2870108", 0x1b}], 0x1}, 0x0) [ 352.221522] binder: release 12937:12944 transaction 9 out, still active [ 352.241345] binder_alloc: 12937: binder_alloc_buf, no vma [ 352.259148] binder: unexpected work type, 4, not freed 00:45:55 executing program 4: preadv(0xffffffffffffffff, 0x0, 0x0, 0x8000400000000000) 00:45:55 executing program 0: syz_emit_ethernet(0x34, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast2}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 00:45:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f00000001c0)) [ 352.287633] binder: 12937:12944 transaction failed 29189/-3, size 0-0 line 2973 [ 352.311221] binder: undelivered TRANSACTION_COMPLETE [ 352.325368] binder_alloc: binder_alloc_mmap_handler: 12937 20001000-20004000 already mapped failed -16 [ 352.378783] binder: BINDER_SET_CONTEXT_MGR already set 00:45:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b", 0x1f}], 0x1}, 0x0) [ 352.419870] binder: 12937:12944 ioctl 40046207 0 returned -16 [ 352.435213] binder: undelivered TRANSACTION_ERROR: 29189 [ 352.441666] binder: send failed reply for transaction 9, target dead 00:45:55 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x14, 0x0, &(0x7f0000000180)=[@acquire_done], 0x0, 0x0, 0x0}) 00:45:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x2}, 0x28, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000280)=0x1) 00:45:55 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x44, 0x0, &(0x7f0000000180)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000200)="ae"}) 00:45:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x3) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 00:45:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f00000001c0)) 00:45:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b", 0x1f}], 0x1}, 0x0) [ 352.559791] binder: 12973:12977 got reply transaction with no transaction stack [ 352.598678] binder: 12973:12977 transaction failed 29201/-71, size 0-0 line 2741 00:45:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x79}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 352.619843] audit: type=1800 audit(1543884355.303:10587): pid=12979 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=17307 res=0 [ 352.622061] EXT4-fs (sda1): resizing filesystem from 524032 to 1 blocks [ 352.653718] binder: 12982:12983 BC_ACQUIRE_DONE u0000000000000000 no match 00:45:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, 0x0) 00:45:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x3) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 00:45:55 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchown(r0, 0x0, 0x0) 00:45:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b", 0x1f}], 0x1}, 0x0) [ 352.761259] EXT4-fs warning (device sda1): ext4_resize_fs:1930: can't shrink FS - resize aborted 00:45:55 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfffffffffffffef1, 0x0, 0x0, 0xfffffffffffffeaf) 00:45:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d", 0x21}], 0x1}, 0x0) 00:45:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') openat$ptmx(0xffffffffffffff9c, 0x0, 0x201, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r0 = open(&(0x7f0000000180)='./file0\x00', 0x8000000000141042, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000500)={0x43, 0x9, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x43) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 00:45:55 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x9196bbdf0c81d5e5) socket$inet(0x2, 0x0, 0x0) r1 = open(0x0, 0x40141042, 0x0) socket$inet(0x2, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000580)=0xc) r3 = getpgid(r2) sched_setparam(r3, &(0x7f0000000380)) r4 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x10, 0x105082) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) listxattr(0x0, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000100)={0xf, 0x7, {0x57, 0x6, 0x2, {0xffffffff7fffffff, 0x4}, {0x800}, @period={0x5c, 0x7fff, 0x1fb, 0x5, 0xc58c, {0x4, 0x3, 0x7f, 0x8}, 0x8, &(0x7f0000000040)=[0x4, 0x2f2, 0x0, 0x200, 0x7fffffff, 0x7, 0x1bb98ce9, 0x20]}}, {0x54, 0xecd0, 0x400, {0x1f, 0xa48}, {0x7ff, 0x9}, @ramp={0x9, 0x100000001, {0x8, 0x8, 0xfffffffffffffffb, 0x1ff}}}}) r5 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pipe2(&(0x7f0000000000), 0x3) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) creat(0x0, 0xe) getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) fallocate(r4, 0x11, 0x0, 0x100000001) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000540)={'ip6gretap0\x00', 0x6}) socket$inet(0x2, 0x0, 0x6432b248) 00:45:55 executing program 3: r0 = socket(0x11, 0x2, 0x3) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 00:45:55 executing program 5: 00:45:55 executing program 2: 00:45:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d", 0x21}], 0x1}, 0x0) 00:45:55 executing program 2: 00:45:55 executing program 3: 00:45:55 executing program 5: 00:45:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d", 0x21}], 0x1}, 0x0) 00:45:56 executing program 2: 00:45:56 executing program 5: 00:45:56 executing program 4: 00:45:56 executing program 0: 00:45:56 executing program 3: 00:45:56 executing program 2: 00:45:56 executing program 5: 00:45:56 executing program 4: 00:45:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d06", 0x22}], 0x1}, 0x0) 00:45:56 executing program 3: 00:45:56 executing program 2: 00:45:57 executing program 4: 00:45:57 executing program 5: 00:45:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d06", 0x22}], 0x1}, 0x0) 00:45:57 executing program 0: 00:45:57 executing program 2: 00:45:57 executing program 4: 00:45:57 executing program 5: 00:45:57 executing program 3: 00:45:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081ae00060c00000f0000020000006c0000f28701086fabca1b4e7d06", 0x22}], 0x1}, 0x0) 00:45:57 executing program 4: 00:45:57 executing program 2: 00:45:57 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x15, 0x10, 0xc6}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001340)={r0, &(0x7f00000002c0)="f5", 0x0}, 0x20) 00:45:57 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x894a, &(0x7f0000000100)='sit0\x00') 00:45:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400e4ffffffa504000001000000b7050000240000006a0a00fe00000000850000003f000000b7000000000000009500000000000000"], 0x0}, 0x48) 00:45:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8981, 0x0) 00:45:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1000, 0x1018, 0x0, {"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"}}, {0x0, "1b4ea0dc60345e0e4cef7719ed3fd77c2cc3a6edd5b21d04bd30e980217313655a6cea2143da4f9e90211da1919b7d9dc9b56aa9"}}, 0x0, 0x104e, 0x0, 0x1}, 0x20) 00:45:57 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x65, &(0x7f00000000c0), 0x54deded00158a180) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f00000001c0), 0xfce9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) 00:45:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r1 = creat(&(0x7f0000000000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) ftruncate(0xffffffffffffffff, 0x0) write$P9_RCLUNK(r1, 0x0, 0x0) 00:45:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)) write$binfmt_misc(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200), 0x0) 00:45:57 executing program 0: getpgrp(0xffffffffffffffff) creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) stat(0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 00:45:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="0180c2009e02fa4d7d1b56b8ce2c0000002c00000000c13fb1ec278e530300000200"], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) 00:45:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d60000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000b2f000)={0x0, 0x0, &(0x7f0000030fa0)=[{&(0x7f000034df41)=""/191, 0xbf}, {0x0}], 0x2}, 0x0) 00:45:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d60000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000704000)={0x0, 0x0, &(0x7f0000724ff0)=[{&(0x7f0000fa7f12)="b1c54112aad2c4c3c495962c2e68b6455b79accaad45c65a1270dce257777350e2ea63300c04f8e3a2918b719d1a509471e6aedf6210a53e3397a5557e143ffc1c106af5452f296befba34bfaafb53dfd72d8b115f633e4fd99491f57d2178ac50c94957ae79071af2f524819d44731d892a83cae4a3788b65812acc97dff3b79b118d255a1683d872eb0aa9b38316917a00456e29b0e750cc67ad010981f6c88c418779a772cf32", 0xa8}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000b2f000)={0x0, 0x0, &(0x7f0000030fa0)=[{&(0x7f000034df41)=""/191, 0xbf}], 0x1}, 0x0) 00:45:58 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000100)=""/4096) 00:45:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d60000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000b2f000)={0x0, 0x0, &(0x7f0000030fa0)=[{&(0x7f000034df41)=""/191, 0xbf}, {0x0}], 0x2}, 0x0) 00:45:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) fstat(r0, &(0x7f0000000000)) 00:45:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0}, 0x10) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x5}, 0x1c) 00:45:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000280)) 00:45:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000d60000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) 00:45:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000d60000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r2 = accept$alg(r0, 0x0, 0x0) recvmsg(r2, &(0x7f0000b2f000)={0x0, 0x0, &(0x7f0000030fa0)=[{&(0x7f000034df41)=""/191, 0xbf}, {0x0}], 0x2}, 0x0) 00:45:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)) write$binfmt_misc(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200), 0x0) 00:45:58 executing program 3: shmget(0xffffffffffffffff, 0x4000, 0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil) 00:45:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) iopl(0x2) 00:45:58 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 00:45:58 executing program 4: r0 = socket$inet6(0xa, 0x1000002000000802, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, 0x0, 0x0) 00:45:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x108, 0x0, 0x0, 0x0, 0x0, 0x9006}, "", [[], [], [], [], [], []]}, 0x620) 00:45:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086610, &(0x7f0000001300)={0x2880008}) 00:45:58 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000001400075e1dfffd946fa2830020200a000a0000000a1d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 356.045128] audit: type=1326 audit(1543884358.733:10588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13196 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 356.154164] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 356.166622] EXT4-fs warning (device sda1): ext4_resize_fs:1917: can't read last block, resize aborted 00:45:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) 00:45:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(r0, &(0x7f0000000900)={&(0x7f0000000200)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000340)=[{0xc}], 0xc, 0x20000000}, 0x24044800) 00:45:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) inotify_rm_watch(0xffffffffffffffff, 0x0) 00:45:59 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x40000000031, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@buf) [ 356.463094] audit: type=1326 audit(1543884359.153:10589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13224 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 356.526713] audit: type=1326 audit(1543884359.203:10590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13230 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 356.779726] audit: type=1326 audit(1543884359.463:10591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13196 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:59 executing program 2: socketpair$unix(0x1, 0x100000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000002c0)) setitimer(0x0, 0x0, 0x0) 00:45:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 00:45:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) migrate_pages(0x0, 0x0, 0x0, 0x0) 00:45:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000180), 0x10) 00:45:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1_to_bond\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40) [ 356.899756] audit: type=1326 audit(1543884359.583:10592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13240 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chmod(0x0, 0x0) [ 356.965805] audit: type=1326 audit(1543884359.623:10593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13242 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:45:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdd8, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x800) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 357.064418] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:45:59 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x4000300, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000001c0)='./file0\x00', 0x1044, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 357.256161] audit: type=1326 audit(1543884359.943:10594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13224 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 357.312301] audit: type=1326 audit(1543884360.003:10595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13230 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:00 executing program 1: 00:46:00 executing program 0: 00:46:00 executing program 1: 00:46:00 executing program 0: 00:46:00 executing program 1: socket$inet6(0xa, 0x2, 0x0) 00:46:00 executing program 4: [ 357.697556] audit: type=1326 audit(1543884360.383:10596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13240 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 357.719371] audit: type=1326 audit(1543884360.403:10597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13242 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:00 executing program 3: 00:46:00 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="d13ff3d776", 0x0) 00:46:00 executing program 2: 00:46:00 executing program 1: 00:46:00 executing program 4: 00:46:00 executing program 5: 00:46:00 executing program 0: 00:46:00 executing program 3: 00:46:00 executing program 1: 00:46:00 executing program 4: 00:46:00 executing program 2: 00:46:00 executing program 3: 00:46:00 executing program 0: 00:46:00 executing program 1: 00:46:00 executing program 4: 00:46:00 executing program 5: 00:46:00 executing program 2: 00:46:00 executing program 4: 00:46:00 executing program 3: 00:46:01 executing program 0: 00:46:01 executing program 1: 00:46:01 executing program 5: 00:46:01 executing program 2: 00:46:01 executing program 3: 00:46:01 executing program 4: 00:46:01 executing program 0: 00:46:01 executing program 2: 00:46:01 executing program 1: 00:46:01 executing program 4: 00:46:01 executing program 3: 00:46:01 executing program 5: 00:46:01 executing program 0: 00:46:01 executing program 2: 00:46:01 executing program 1: 00:46:01 executing program 4: 00:46:01 executing program 3: 00:46:01 executing program 0: 00:46:01 executing program 5: 00:46:01 executing program 2: 00:46:01 executing program 3: 00:46:01 executing program 4: 00:46:01 executing program 1: 00:46:01 executing program 0: 00:46:01 executing program 5: 00:46:01 executing program 3: 00:46:01 executing program 2: 00:46:01 executing program 1: 00:46:01 executing program 4: 00:46:01 executing program 0: 00:46:02 executing program 2: 00:46:02 executing program 5: 00:46:02 executing program 3: 00:46:02 executing program 0: 00:46:02 executing program 1: 00:46:02 executing program 4: 00:46:02 executing program 2: 00:46:02 executing program 5: 00:46:02 executing program 3: 00:46:02 executing program 1: 00:46:02 executing program 4: 00:46:02 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000140)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x3c}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14}]}, 0x104}}, 0x0) 00:46:02 executing program 2: mkdir(0x0, 0x0) inotify_init() r0 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 00:46:02 executing program 5: ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) 00:46:02 executing program 3: r0 = memfd_create(&(0x7f0000000180)="64767620cf5f4e295194a5972726dacf46cc112894b3bb09d2d74e7f860f8ea00d0b33fa19eb6650036bb8ed967e3acbd845e61de5313c6210f358dbcac521b59663c7b2b1a5118493f7ca5a", 0x0) fcntl$addseals(r0, 0x409, 0x0) 00:46:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x200000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x208200) mknod$loop(0x0, 0x0, 0xffffffffffffffff) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 00:46:02 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x7fc, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f00000003c0)={0x1, 0x1, 0x2, 0x7}) get_robust_list(0x0, &(0x7f0000000580)=&(0x7f0000000540), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) rmdir(&(0x7f0000001700)='./file0\x00') close(r1) r2 = socket(0x840000000002, 0x3, 0xff) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) syslog(0x9, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) r4 = syz_open_procfs(0x0, &(0x7f0000000740)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r2, r4, 0x0, 0x100000001) getresgid(&(0x7f00000017c0), 0x0, &(0x7f0000005400)) sendmsg$netlink(r3, &(0x7f0000005500)={&(0x7f0000001740)=@proc={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc, &(0x7f0000001780), 0x0, 0x0, 0x0, 0x20000000}, 0x4000004) [ 359.765206] mip6: mip6_destopt_init_state: state's mode is not 2: 0 00:46:02 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() r2 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') r3 = openat$cgroup_ro(r2, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000004c0)={r1, 0x0, 0x6f3, 0x6, 0x40}) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000600)=@dstopts={0x11, 0x8, [], [@hao={0xc9, 0x10, @loopback}, @enc_lim={0x4, 0x1, 0x9}, @ra={0x5, 0x2, 0x7}, @hao={0xc9, 0x10, @mcast1}, @calipso={0x7, 0x18, {0xb4, 0x4, 0x2, 0x3, [0x8000, 0x7]}}]}, 0x50) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000300)) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x200000, &(0x7f000000a000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r5, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0xffffffffffffffff) preadv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 00:46:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 00:46:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) shutdown(r0, 0x0) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) 00:46:03 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=',', 0x1}], 0x1}, 0xc100) getpid() write(r0, &(0x7f0000001680)="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", 0x73f) 00:46:03 executing program 5: setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f0000000300)=[{&(0x7f0000001000)="01", 0x1}], 0x1, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 00:46:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='reno\x00', 0x5) 00:46:03 executing program 3: pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @dev}, 0x1c) lsetxattr$security_evm(0x0, &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000400)=@ng, 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) setpriority(0x2, 0x0, 0x5) 00:46:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0)={0x0, 0x7530}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 00:46:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)=@delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xc, 0x2, @empty=[0xf0ffffff]}]}, 0x28}}, 0x0) 00:46:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x200000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x208200) mknod$loop(0x0, 0x0, 0xffffffffffffffff) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 00:46:03 executing program 5: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="fa", 0x1, 0xfffffffffffffffb) 00:46:03 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x7fc, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f00000003c0)={0x1, 0x1, 0x2, 0x7}) get_robust_list(0x0, &(0x7f0000000580)=&(0x7f0000000540), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) rmdir(&(0x7f0000001700)='./file0\x00') close(r1) r2 = socket(0x840000000002, 0x3, 0xff) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) syslog(0x9, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) r4 = syz_open_procfs(0x0, &(0x7f0000000740)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r2, r4, 0x0, 0x100000001) getresgid(&(0x7f00000017c0), 0x0, &(0x7f0000005400)) sendmsg$netlink(r3, &(0x7f0000005500)={&(0x7f0000001740)=@proc={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc, &(0x7f0000001780), 0x0, 0x0, 0x0, 0x20000000}, 0x4000004) 00:46:04 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") pipe(0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) 00:46:04 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x34000, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0x5000000, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) 00:46:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1b) 00:46:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}) 00:46:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:46:04 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 00:46:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) accept4(r1, &(0x7f0000000200)=@generic, 0x0, 0x0) [ 361.870126] input: syz1 as /devices/virtual/input/input18 [ 361.984290] input: syz1 as /devices/virtual/input/input19 00:46:04 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) 00:46:04 executing program 5: 00:46:04 executing program 2: 00:46:04 executing program 1: [ 362.171270] input: syz1 as /devices/virtual/input/input20 00:46:04 executing program 5: 00:46:05 executing program 0: 00:46:05 executing program 2: 00:46:05 executing program 4: 00:46:05 executing program 3: 00:46:05 executing program 1: 00:46:05 executing program 2: 00:46:05 executing program 0: 00:46:05 executing program 4: 00:46:05 executing program 5: 00:46:05 executing program 1: 00:46:05 executing program 2: 00:46:05 executing program 0: 00:46:05 executing program 5: 00:46:05 executing program 4: 00:46:05 executing program 3: 00:46:05 executing program 1: 00:46:05 executing program 5: 00:46:05 executing program 0: 00:46:05 executing program 4: 00:46:05 executing program 2: 00:46:05 executing program 3: 00:46:05 executing program 1: 00:46:05 executing program 4: 00:46:05 executing program 0: 00:46:05 executing program 5: 00:46:05 executing program 2: 00:46:05 executing program 3: 00:46:05 executing program 4: 00:46:05 executing program 1: 00:46:05 executing program 2: 00:46:05 executing program 5: 00:46:05 executing program 0: 00:46:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='cmdline\x00') sendfile(r1, r2, 0x0, 0x100000001) 00:46:06 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) fchown(r0, 0x0, 0x0) 00:46:06 executing program 4: pipe2(0x0, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000580)=0xffffffffffffffd4) sched_setparam(0x0, &(0x7f0000000380)) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='/dev/loop#\x00', 0x0) 00:46:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 00:46:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 00:46:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) unshare(0x2000400) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fsync(r0) 00:46:06 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r3, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:06 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(0x0, 0x0, 0x0, 0x0) 00:46:06 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) 00:46:06 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getgroups(0x0, 0x0) 00:46:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) [ 363.685915] audit: type=1326 audit(1543884366.373:10598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13634 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:06 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sigaltstack(&(0x7f0000fef000/0x11000)=nil, 0x0) 00:46:06 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="4c0000001200ff09fffefd956fa283b724a60080000000000000006835407cd1a6dc1d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x0, &(0x7f0000000240)}}], 0x1, 0x0, 0x0) 00:46:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 00:46:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) 00:46:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) getcwd(&(0x7f00000000c0)=""/15, 0xf) [ 363.964549] netlink: 44 bytes leftover after parsing attributes in process `syz-executor2'. [ 364.000619] netlink: 44 bytes leftover after parsing attributes in process `syz-executor2'. [ 364.024807] netlink: 44 bytes leftover after parsing attributes in process `syz-executor2'. [ 364.048385] netlink: 44 bytes leftover after parsing attributes in process `syz-executor2'. [ 364.057683] netlink: 44 bytes leftover after parsing attributes in process `syz-executor2'. 00:46:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = mq_open(&(0x7f0000000040)='(\x00', 0x0, 0x0, 0x0) dup(r0) 00:46:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) truncate(0x0, 0x0) [ 364.068851] netlink: 44 bytes leftover after parsing attributes in process `syz-executor2'. [ 364.077919] audit: type=1326 audit(1543884366.753:10599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13671 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 364.117492] audit: type=1326 audit(1543884366.753:10600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13670 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 364.193620] audit: type=1326 audit(1543884366.883:10601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13680 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 364.215469] audit: type=1326 audit(1543884366.903:10602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13681 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 364.484011] audit: type=1326 audit(1543884367.173:10603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13634 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:07 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r3, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) setrlimit(0x400000000000007, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x100000203, 0x0, r0}, 0x2c) 00:46:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xffffffff}]}) restart_syscall() [ 364.727320] audit: type=1326 audit(1543884367.413:10604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13694 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 364.797798] audit: type=1326 audit(1543884367.483:10605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13701 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000a40)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "", [[], [], [], [], []]}, 0x578) [ 364.839154] audit: type=1326 audit(1543884367.523:10606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13670 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 364.863431] audit: type=1326 audit(1543884367.553:10607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13671 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/tcp6\x00') preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/169, 0x201}], 0x1000000000000345, 0x0) 00:46:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) 00:46:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) dup2(r0, r1) 00:46:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000002c0)=0x29e8, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffba, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 00:46:07 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) futimesat(r0, 0x0, 0x0) 00:46:07 executing program 1: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) 00:46:07 executing program 5: getrusage(0xffffffffffffffff, &(0x7f0000000240)) 00:46:07 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RCLUNK(r1, &(0x7f0000000100)={0x7}, 0x7) ppoll(&(0x7f0000000140)=[{r0}], 0x1, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:46:08 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r3, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:08 executing program 0: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2) 00:46:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)={0x0, 0x5}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=',', 0x1}], 0x1}, 0xc100) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000780)='./file0\x00', 0x0) getpid() getegid() getgroups(0x3, &(0x7f0000001440)=[0xee01, 0xee01, 0x0]) getpgrp(0x0) lstat(&(0x7f0000000100)='./file0/file0\x00', 0x0) stat(&(0x7f0000002d80)='./file0\x00', 0x0) getresgid(&(0x7f00000005c0), 0x0, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000003340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004d00)) fstat(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000001680)="e6a2e0091b61501ea87850c6d258201cbf3fe9fe75bc31032c1bd695e6f89fffb8dd1bb327cde2fa8115c8949109dddb3332b28603a1e35d08e3d07606314bc0e1cf58b62864f0023821ae335454a2a6d9cc29a3fc3d2c30ff2907f14f80fce3c468ce732418663bbb11e34e1f9e819d012f4928b5fb59fb31755c98649f35c587263cbf7830ddde04ed4e4a9fda1923d06559d4e9df911797333a46b8d2268133da26a6e59e35a66021404ba08e9b550cd132eda9a970ae2ef50b25dbe1c3da78074af2a762c27eeb9b22630beec52475e7a8a159fad88d41e8309b5e32983e315025fbc9c7603d676a5316fffcb42642150cd498d59748ff6200a73c31b403eb73a20b57a47e7d69aa0bb5c59235f2fd893d6b5b86efa9b05a2b566184e4f8a3589d5d5e09337f161517cdcac41b5732064919358d7cd6a9b1fb0a5ad5c4106124da93437fed9f2503223c3eb1103cd9b1a9ecf29674ea86921bd5b0094e3937a1286a44089ef4b42cca8e46cfda355cfe8622e860f416b60af1196f7c0196daa0bf0dd3797d0b8199ac4e2381d92f473393b860c9f97a08324c83c372553042c7f24709106c016ff1e20c93d645e734daaf50f13ad845377b895c1dede9b73432d24c9f6207bc31fe8fb9900377b387f8787f20849ec05b0d44982a78a650e12306efff6f4ef89b0eb175bfff545fda8692314d7fc9e8f4fdffd01b56a6b1358adab6d78f3d693e6781c8bf399024aaa888d572d59cf7cdb74aa974d20549a47624f35caf0956651e8d24079e0866e0172f2fc26af14c628f99051e04e50fba06de938d52d934a78921d5144d18e8c5d1f4fd2d0e7ca22119be065574f5f7dfbabbc44d42b51d62d658ed2ed1250d7821a09d26760bca0f8bc1b186e5cf931377b2adefca5a752c7f9e82224c5734c88d27c3afb7d785ee510fb3806f42bbff9fe9bc1d50cb329bb666a1d766182ffd6b6aee8535406b2a77e2328d90b90950034dd468577693571bc9a9fb9f8aeae67d5a8747f85e38318d97f458c6c9fed9c3b8f0affe63a2adaa57e472449c76b53af7f0cf9087e62bd5556947e681873a002c78d08326290a34489f5eb7acb38367778460473e6b5e4a8c5caa8213092cf59a2f3834548793ef1a55983af67a304c187ded353c4b3f95b9ec569fdc39b60613f8f622a759b7b6a59901d32a2725c7db7768259ad896a7315d07c850035b67dd4ba1ab8be64d2dcf83988b66f3801c26164b3ceb65778e2db97212cac966167ffea65af621e027588b76a23d01995d91e83b6ba104272789f857e75cb959a2206a439d56fd89108d4d6590ac1c6da88cdc53913a51c4b68c17aa26a050d026d6aff72329f597f506280268c61507d62535345d6d2c9e48343825fc36648aa68b2d01c404dfd1dedcba7532f510316d7b18baa8786bd5fa2d1b56c875de3ea88201003b92f6d70ee1e9408cceb561ea511db3a8c85da59390668c486fe1e555b317e767046f69ee031d6021369a01a474bbb3d6f5b094d78745ce3f8ad89e373c18ec3c2dd85af00a79ebaaffb7c049386078bf0b9b56b686c1f0a8855fb1007eb306a68fd840176ff09797edfbace33d4f213ea3599d97d643569ed40a69a41083c65592508305b234587a79aae09645416898a659b17a2c778f5bb2f80878f01f3a14a0488e48fd9d4670cf218b4da04e79c03f77174717e3c25a888bd6286dd91f08af9d281da4bae8d033197171c4fd2503ed398059a78d0ed1fbd98dba8314008ed399ab3ccb56847d30fff2b26a3be5d84af230e1915c2ab7eef4b01b29986985db14213b9b05816ef7724aa896073641a7bc6eb9406e79fa961eb8afbeba75293c1f786e3c8c051733565f40dcfb0f45a036fd01e25be3291f0f5eba9523ba1679a35aebbcfa896ab6401296270ba8742259adaf5a52606c3239b8ecc208e39ee916d09f55e5789d5b08c72984dffb4511ee23cd741a73aba019f14712758376c53649b8ed6f7e4d1805568221feb803a1d1e63df108d435b42fb0f38e3c6410f15d0f56142d4aba83d7bfe3ef5844d4ed36f0bfa6046697742a89689941fa04a68da4e7cbaf6e284d08a8fc3fb9150a6e262b55d616ccb3999a2ff16f6b571c24ce61d9e51d2f4bd294361fa2bf7fa193fac13535233de13789a1131daed83bd6d403be2ef6edd7d45b9d3cf77c2aa4d79fcbad52462b21bfc89920578e2a60363fb274e242d640109ef5dde5f218e256da68aca762883b7cbefdea6eddc013257214d9bb588ed83a517dd9d34fcc32824f9d880712c2fe48f4e8949728473a6bf9688f999adf2e219423090a75b1acfc8ea96105e22de77e415e7b406b47ffb57bdc26ead43ba946a2be6602c64c79275a0ed0fdbbae0825b63c939a0e3ae6dcfbc2f1b6ddb3d4ec7479e85407fb70ac4813951705d6cf1a35d73e97f6fed3ad2d4e60af3e9c5393200dc6b7bb809d5d44247b2b224e4232b7adb97f060ea85bf22cdd8a2f7533d703fd75d6498e517478e144da0c273edcd31fea2143bed37c930c02c2d74261966e18b3ee1c1aa1f0517563aa840a151785d941ffbd70683b165e3a31395d1d7d91189ab7985901f113d11a9e5879f2e581ec7c021733032cdfb93b6e70672553b60b065553a636e6107ccdeb6ca6723dd5a847a48a398d8881ba71939d7f9bce69eef7d9b3a9fe1295764dda43e2c47f9fedcc75fde6ed0bf9603edd813a7650b1e836b37cbf82cefe5bb9a45d538abdddc61c8146cacb87256548374c649f43835d3f89ab1d431649e60da4613bf138a6e5867ce7697a90a231d8e15e5b1e923b10c1d0fac27a23e93c6c8567203b3b3145d4a6fc11eba96f66488939cfb8380ab07a422f1ee65f6445750e6ebfb198e7f45a842c5dbb9b2efbb804befc7f83b1c156dae1eac3391408378c2b70835b9a15a557d5e7ca0f199f7e0ba7c3c42b22f3006d55948634eeb0f96a22a8c87599b6e6fb917d76303de66650bdfa38728714e63d384d56410d1643dc818d15fe8e8ddf0a13829d23bde4d76a2764239ce1ac471251dc7fb8aa40820bb3f40dc62ea02ea94d96ebd553a51442b828d4dc62f6c83522a5487647761e3bc8ef183764d65a4a8c381710a738ac367d31a357ef5f15ba0a4ddd8d866e5930cce48ce67eee57a81944b823446b7a31ae6cb1a2e5a27430deec4ba8782172365c9fc76592f08c9ef7e597b5cc2fdf2aeb6ae788b4589fe277fa", 0x8f5) 00:46:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3c) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)={0x0, 0x5}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=',', 0x1}], 0x1}, 0xc100) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, 0x0) getpid() getegid() getgroups(0x2, &(0x7f0000001440)=[0xee01, 0xee00]) getpgrp(0x0) getresgid(&(0x7f0000002a40), 0x0, &(0x7f0000002ac0)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000003340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004d00)) fstat(0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) write(r0, &(0x7f0000001680)="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", 0x8f5) 00:46:08 executing program 5: clone(0x2102011ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:46:08 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) 00:46:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) alarm(0x6) 00:46:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x80000) 00:46:08 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 00:46:08 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)={0x0, 0x5}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=',', 0x1}], 0x1}, 0xc100) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000780)='./file0\x00', 0x0) getpid() getegid() getgroups(0x3, &(0x7f0000001440)=[0xee01, 0xee01, 0x0]) getpgrp(0x0) lstat(&(0x7f0000000100)='./file0/file0\x00', 0x0) stat(&(0x7f0000002d80)='./file0\x00', 0x0) getresgid(&(0x7f00000005c0), 0x0, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000003340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000004d00)) fstat(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000001680)="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", 0x8f5) 00:46:08 executing program 5: socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mlockall(0x1) 00:46:08 executing program 4: 00:46:09 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r3, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x80000) 00:46:09 executing program 1: 00:46:09 executing program 2: 00:46:09 executing program 5: 00:46:09 executing program 4: 00:46:09 executing program 1: 00:46:09 executing program 4: 00:46:09 executing program 2: 00:46:09 executing program 5: 00:46:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x80000) 00:46:09 executing program 4: 00:46:09 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r3, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:09 executing program 5: 00:46:09 executing program 2: 00:46:09 executing program 1: 00:46:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x80000) 00:46:09 executing program 4: 00:46:10 executing program 5: 00:46:10 executing program 4: 00:46:10 executing program 2: 00:46:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x80000) 00:46:10 executing program 1: 00:46:10 executing program 2: 00:46:10 executing program 1: 00:46:10 executing program 4: 00:46:10 executing program 2: 00:46:10 executing program 5: 00:46:10 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r3, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x80000) 00:46:10 executing program 1: 00:46:10 executing program 4: 00:46:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x400c07a) 00:46:11 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000100)=0x8) 00:46:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x80000) 00:46:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffd) 00:46:11 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1000) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000001180)='threaded\x00', 0xfc9a) fallocate(r3, 0x0, 0x0, 0x10001) sendfile(r1, r2, 0x0, 0xffffffff000) creat(&(0x7f0000000040)='./file0\x00', 0x0) 00:46:11 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x64) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) sendto(r0, &(0x7f0000000040)="b6", 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000140), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 00:46:11 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 00:46:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x400c07a) [ 368.712717] kauditd_printk_skb: 11 callbacks suppressed [ 368.712733] audit: type=1804 audit(1543884371.403:10619): pid=13894 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir066628889/syzkaller.6QfNuJ/324/file0" dev="sda1" ino=16721 res=1 [ 368.751620] audit: type=1804 audit(1543884371.433:10620): pid=13894 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir066628889/syzkaller.6QfNuJ/324/file0" dev="sda1" ino=16721 res=1 [ 368.805236] audit: type=1804 audit(1543884371.493:10621): pid=13894 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir066628889/syzkaller.6QfNuJ/324/file0" dev="sda1" ino=16721 res=1 00:46:11 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r3, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x1, 0x2, 0x3fc0, 0x0, r0, 0x2}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x400, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=0x80000001, 0x12) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffc, 0x0, 0x820000, 0x0}, 0x2c) 00:46:11 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x80000) 00:46:11 executing program 4: epoll_create1(0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) umount2(&(0x7f00000005c0)='./file0\x00', 0x0) 00:46:11 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fchmod(r0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:46:11 executing program 5: sched_setaffinity(0x0, 0xffffffffffffffb1, &(0x7f0000000180)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = getpgid(0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000380)=r2) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000300), 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = gettid() connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) r5 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x20880, 0x0, 0x1000, 0x0, 0x856, 0x8, 0x8, 0x1, 0x8001, 0x0, 0x0, 0x0, 0x80000000, 0x8, 0x0, 0x101, 0x5, 0x55, 0x0, 0x80000001, 0x0, 0x0, 0x88, 0x0, 0x0, 0x82, 0x401, 0x10000, 0x3, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x1f}, 0x3442, 0x9, 0x0, 0x7, 0x1, 0x7, 0x9}, r4, 0x0, r0, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0}, &(0x7f0000001880)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000018c0)={@local, @empty, @mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, r6}) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000200)) ioctl$FS_IOC_FSGETXATTR(r5, 0x801c581f, &(0x7f00000002c0)={0x1, 0x24, 0x1, 0xfffffffffffffffb}) r8 = syz_open_procfs(r4, &(0x7f0000000080)='mountstats\x00') write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r8, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8001}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x4) writev(r9, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) [ 369.126163] audit: type=1326 audit(1543884371.813:10622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13914 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:11 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, 0x0) 00:46:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 00:46:12 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_init() r1 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') r2 = openat$cgroup_ro(r1, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000600)=@dstopts={0x11, 0x8, [], [@hao={0xc9, 0x10, @loopback}, @ra={0x5, 0x2, 0x7}, @hao={0xc9, 0x10, @mcast1}, @calipso={0x7, 0x18, {0xb4, 0x4, 0x2, 0x3, [0x8000, 0x7]}}]}, 0x50) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000300)) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x200000, &(0x7f000000a000)) chdir(&(0x7f00000001c0)='./file0\x00') r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ftruncate(r4, 0x208200) r5 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', r2}, 0x10) fcntl$dupfd(r2, 0x406, r2) getsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r5, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0xffffffffffffffff) preadv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 00:46:12 executing program 2: 00:46:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup3(r1, r0, 0x80000) 00:46:12 executing program 1: 00:46:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup3(r1, r0, 0x80000) 00:46:12 executing program 2: 00:46:12 executing program 5: sched_setaffinity(0x0, 0xffffffffffffffb1, &(0x7f0000000180)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = getpgid(0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000380)=r2) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000300), 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = gettid() connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) r5 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x20880, 0x0, 0x1000, 0x0, 0x856, 0x8, 0x8, 0x1, 0x8001, 0x0, 0x0, 0x0, 0x80000000, 0x8, 0x0, 0x101, 0x5, 0x55, 0x0, 0x80000001, 0x0, 0x0, 0x88, 0x0, 0x0, 0x82, 0x401, 0x10000, 0x3, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x1f}, 0x3442, 0x9, 0x0, 0x7, 0x1, 0x7, 0x9}, r4, 0x0, r0, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0}, &(0x7f0000001880)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000018c0)={@local, @empty, @mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, r6}) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000200)) ioctl$FS_IOC_FSGETXATTR(r5, 0x801c581f, &(0x7f00000002c0)={0x1, 0x24, 0x1, 0xfffffffffffffffb}) r8 = syz_open_procfs(r4, &(0x7f0000000080)='mountstats\x00') write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r8, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8001}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x4) writev(r9, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 00:46:12 executing program 1: sched_setaffinity(0x0, 0xffffffffffffffb1, &(0x7f0000000180)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = getpgid(0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000380)=r2) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000300), 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = gettid() connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) r5 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x20880, 0x0, 0x1000, 0x0, 0x856, 0x8, 0x8, 0x1, 0x8001, 0x0, 0x0, 0x0, 0x80000000, 0x8, 0x0, 0x101, 0x5, 0x55, 0x0, 0x80000001, 0x0, 0x0, 0x88, 0x0, 0x0, 0x82, 0x401, 0x10000, 0x3, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x1f}, 0x3442, 0x9, 0x0, 0x7, 0x1, 0x7, 0x9}, r4, 0x0, r0, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0}, &(0x7f0000001880)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000018c0)={@local, @empty, @mcast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, r6}) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000200)) ioctl$FS_IOC_FSGETXATTR(r5, 0x801c581f, &(0x7f00000002c0)={0x1, 0x24, 0x1, 0xfffffffffffffffb}) r8 = syz_open_procfs(r4, &(0x7f0000000080)='mountstats\x00') write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r8, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8001}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x4) writev(r9, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 00:46:12 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:12 executing program 4: 00:46:12 executing program 2: 00:46:12 executing program 4: 00:46:12 executing program 1: 00:46:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup3(r1, r0, 0x80000) [ 370.046342] audit: type=1326 audit(1543884372.733:10623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=13963 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:12 executing program 2: 00:46:12 executing program 4: 00:46:12 executing program 1: 00:46:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) dup3(r1, r0, 0x80000) 00:46:13 executing program 5: 00:46:13 executing program 2: 00:46:13 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:13 executing program 4: 00:46:13 executing program 1: 00:46:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) dup3(r1, r0, 0x80000) 00:46:13 executing program 2: 00:46:13 executing program 5: 00:46:13 executing program 4: 00:46:13 executing program 1: 00:46:13 executing program 2: setgid(0x0) 00:46:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 370.935561] audit: type=1326 audit(1543884373.623:10624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14004 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) dup3(r1, r0, 0x80000) 00:46:13 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x0, 0xfff9) [ 371.103129] audit: type=1326 audit(1543884373.793:10625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14013 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:14 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:14 executing program 2: capset(0x0, &(0x7f0000000080)) sched_getparam(0x0, &(0x7f00000000c0)) 00:46:14 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x80011, r0, 0x0) sigaltstack(&(0x7f0000000000/0xf000)=nil, 0x0) 00:46:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(0xffffffffffffffff, r0, 0x80000) 00:46:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresuid(&(0x7f00000000c0), 0x0, 0x0) 00:46:14 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000001040)='/proc/self/net/pfkey\x00', 0x3a3000, 0x0) 00:46:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup3(r0, 0xffffffffffffffff, 0x80000) [ 371.808166] audit: type=1326 audit(1543884374.493:10626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14042 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:14 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x0) 00:46:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) write$cgroup_subtree(r0, &(0x7f0000003bc0)=ANY=[@ANYBLOB='\x00'], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) [ 371.885813] audit: type=1326 audit(1543884374.533:10627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14013 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:14 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) 00:46:14 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f00000012c0)=[&(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 00:46:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x0) 00:46:15 executing program 1: 00:46:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x867, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) recvmsg(r0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) openat$cgroup_type(r1, 0x0, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000003b80)) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 00:46:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x0) 00:46:15 executing program 5: 00:46:15 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:15 executing program 4: 00:46:15 executing program 5: 00:46:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x0) 00:46:15 executing program 4: 00:46:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x6}]}, 0x30}}, 0x0) [ 372.719442] audit: type=1326 audit(1543884375.403:10628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14087 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:15 executing program 4: 00:46:15 executing program 5: [ 372.899421] validate_nla: 8 callbacks suppressed [ 372.899433] netlink: 'syz-executor1': attribute type 16 has an invalid length. 00:46:15 executing program 0: [ 373.065127] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 373.095247] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:46:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x867, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) recvmsg(r0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) openat$cgroup_type(r1, 0x0, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000003b80)) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 00:46:16 executing program 5: 00:46:16 executing program 4: 00:46:16 executing program 1: 00:46:16 executing program 0: 00:46:16 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x867, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) recvmsg(r0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) openat$cgroup_type(r1, 0x0, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000003b80)) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 00:46:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x867, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) recvmsg(r0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) openat$cgroup_type(r1, 0x0, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000003b80)) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 00:46:16 executing program 0: 00:46:16 executing program 5: 00:46:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x867, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) recvmsg(r0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) openat$cgroup_type(r1, 0x0, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000003b80)) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 00:46:16 executing program 5: 00:46:16 executing program 0: 00:46:16 executing program 5: 00:46:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x867, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) recvmsg(r0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) openat$cgroup_type(r1, 0x0, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000003b80)) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 00:46:16 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x20) 00:46:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x62e8cd72) 00:46:17 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') fchmod(r0, 0x0) 00:46:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x867, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) recvmsg(r0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) openat$cgroup_type(r1, 0x0, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000003b80)) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 00:46:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'team_slave_1\x00', 0x4fff}) 00:46:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x867, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) recvmsg(r0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) openat$cgroup_type(r1, 0x0, 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000003b80)) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 00:46:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) write(r2, &(0x7f00000003c0)='g', 0x1) 00:46:17 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/keycreate\x00', 0x2, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000180)="83", 0x1}], 0x1) [ 374.610282] kauditd_printk_skb: 1 callbacks suppressed [ 374.610297] audit: type=1326 audit(1543884377.293:10630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14177 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:17 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 00:46:17 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x84012, r1, 0x0) read(r1, &(0x7f0000000200)=""/19, 0x93fa513f) creat(&(0x7f0000000140)='./bus\x00', 0x0) 00:46:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) write(r2, &(0x7f00000003c0)='g', 0x1) 00:46:17 executing program 2: r0 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) fremovexattr(r0, &(0x7f0000000180)=@known='system.posix_acl_access\x00') [ 374.927156] audit: type=1804 audit(1543884377.613:10631): pid=14200 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir188030320/syzkaller.OMTWn2/359/bus" dev="sda1" ino=17430 res=1 [ 375.003790] audit: type=1804 audit(1543884377.663:10632): pid=14204 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir188030320/syzkaller.OMTWn2/359/bus" dev="sda1" ino=17430 res=1 [ 375.048775] audit: type=1804 audit(1543884377.673:10633): pid=14200 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir188030320/syzkaller.OMTWn2/359/bus" dev="sda1" ino=17430 res=1 [ 375.072124] audit: type=1804 audit(1543884377.683:10634): pid=14204 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir188030320/syzkaller.OMTWn2/359/bus" dev="sda1" ino=17430 res=1 [ 375.096274] audit: type=1804 audit(1543884377.683:10635): pid=14200 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir188030320/syzkaller.OMTWn2/359/bus" dev="sda1" ino=17430 res=1 00:46:17 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="ab"], 0x1) 00:46:18 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c00000001040501ff20070401000000000000000c000300000000000000c5010c0004000000000000000000"], 0x2c}}, 0x0) 00:46:18 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 00:46:18 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="abfc84e15564e7"], 0x7) sendfile(r2, r2, 0x0, 0x7fff) socket$packet(0x11, 0x3, 0x300) 00:46:18 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000280)=[{}], 0x20000000000000ec, &(0x7f0000000200)={0x0, r1+30000000}, &(0x7f0000000240), 0x8) llistxattr(0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x1) 00:46:18 executing program 5: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000080)='./file0\x00'}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20245e5e90096cd3689b2089acba2bc09834181e1e53ee5aa0c5b0635549ea2e9b4c315b"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)=0x0) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$RTC_VL_CLR(r1, 0x7014) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=r0, @ANYRESHEX=r0], &(0x7f0000000240)='./file0\x00', &(0x7f0000000440)='sysv\x00', 0x122bc00, &(0x7f0000000100)) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="0180c200000000000000000081000000000c0000000000000000911aab5cc21f21b9cd4cec2e61e28c3a6f545298c266a9efbfae1d119af8d9164f7c46b0a19362163b562c1ae4d85affe82e2e34b2631c4d391833bb34039b61923cc0a63ccc61c46eac0e2e827b1378ba1a970a7eb945fdd0fbd36ed72c00000000000000000000"], 0x0) r2 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r2) socket$inet6(0xa, 0x5, 0x8) socket$netlink(0x10, 0x3, 0x9) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xe) keyctl$describe(0x6, r3, &(0x7f0000000100)=""/210, 0xd2) write$P9_RLERROR(0xffffffffffffffff, &(0x7f00000003c0)={0x15, 0x7, 0x2, {0xc, 'cifs.spnego\x00'}}, 0x15) [ 375.490047] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 375.505094] audit: type=1326 audit(1543884378.193:10636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14221 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) [ 375.544179] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 375.557942] netlink: 'syz-executor1': attribute type 4 has an invalid length. [ 375.574288] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 375.575348] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 375.590901] netlink: 'syz-executor1': attribute type 4 has an invalid length. 00:46:18 executing program 0: socket(0xa, 0x802, 0x88) sched_setaffinity(0x0, 0xffffffffffffffb1, &(0x7f0000000180)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000000)='./bus\x00', 0x110000141042, 0x0) ftruncate(r5, 0x10099b7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') 00:46:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c00000001040501ff20070401000000000000000c000300000000000000c5010c0004000000000000000000"], 0x2c}}, 0x0) 00:46:18 executing program 2: exit(0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), 0x1b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r0, &(0x7f0000847f95), 0x0}, 0x18) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e1d, 0x0, @ipv4={[], [], @multicast1}, 0x800000000000000}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000004c0)=0xe8) 00:46:18 executing program 5: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000080)='./file0\x00'}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20245e5e90096cd3689b2089acba2bc09834181e1e53ee5aa0c5b0635549ea2e9b4c315b"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)=0x0) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$RTC_VL_CLR(r1, 0x7014) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=r0, @ANYRESHEX=r0], &(0x7f0000000240)='./file0\x00', &(0x7f0000000440)='sysv\x00', 0x122bc00, &(0x7f0000000100)) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="0180c200000000000000000081000000000c0000000000000000911aab5cc21f21b9cd4cec2e61e28c3a6f545298c266a9efbfae1d119af8d9164f7c46b0a19362163b562c1ae4d85affe82e2e34b2631c4d391833bb34039b61923cc0a63ccc61c46eac0e2e827b1378ba1a970a7eb945fdd0fbd36ed72c00000000000000000000"], 0x0) r2 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r2) socket$inet6(0xa, 0x5, 0x8) socket$netlink(0x10, 0x3, 0x9) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xe) keyctl$describe(0x6, r3, &(0x7f0000000100)=""/210, 0xd2) write$P9_RLERROR(0xffffffffffffffff, &(0x7f00000003c0)={0x15, 0x7, 0x2, {0xc, 'cifs.spnego\x00'}}, 0x15) 00:46:18 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000280)=[{}], 0x20000000000000ec, &(0x7f0000000200)={0x0, r1+30000000}, &(0x7f0000000240), 0x8) llistxattr(0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x1) [ 375.797462] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 375.864258] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 375.890179] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 375.897191] netlink: 'syz-executor1': attribute type 4 has an invalid length. 00:46:19 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:19 executing program 5: 00:46:19 executing program 1: 00:46:19 executing program 0: socket(0xa, 0x802, 0x88) sched_setaffinity(0x0, 0xffffffffffffffb1, &(0x7f0000000180)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000000)='./bus\x00', 0x110000141042, 0x0) ftruncate(r5, 0x10099b7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') 00:46:19 executing program 1: 00:46:19 executing program 5: [ 376.382249] audit: type=1326 audit(1543884379.073:10637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14283 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:19 executing program 1: 00:46:19 executing program 5: 00:46:19 executing program 1: 00:46:19 executing program 2: 00:46:19 executing program 5: 00:46:19 executing program 4: 00:46:19 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:19 executing program 5: 00:46:19 executing program 0: socket(0xa, 0x802, 0x88) sched_setaffinity(0x0, 0xffffffffffffffb1, &(0x7f0000000180)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000000)='./bus\x00', 0x110000141042, 0x0) ftruncate(r5, 0x10099b7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') 00:46:19 executing program 1: 00:46:19 executing program 4: 00:46:19 executing program 2: 00:46:19 executing program 4: 00:46:19 executing program 5: 00:46:20 executing program 1: 00:46:20 executing program 2: [ 377.342754] audit: type=1326 audit(1543884380.033:10638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14320 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:20 executing program 1: 00:46:20 executing program 2: 00:46:20 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r3, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:20 executing program 4: 00:46:20 executing program 5: 00:46:20 executing program 1: 00:46:20 executing program 0: socket(0xa, 0x802, 0x88) sched_setaffinity(0x0, 0xffffffffffffffb1, &(0x7f0000000180)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000000)='./bus\x00', 0x110000141042, 0x0) ftruncate(r5, 0x10099b7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') 00:46:20 executing program 2: 00:46:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) clock_gettime(0x0, &(0x7f00000001c0)) 00:46:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 00:46:20 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x400000028, 0x7fff, 0x3f}, 0x2c) 00:46:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) [ 378.313219] audit: type=1326 audit(1543884381.003:10639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14349 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) getgroups(0x0, 0x0) 00:46:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) unshare(0x0) 00:46:21 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 00:46:21 executing program 1: getitimer(0x2, &(0x7f0000000800)) 00:46:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 00:46:21 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000180), &(0x7f0000001380)=0x4) 00:46:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 00:46:21 executing program 2: syz_open_procfs(0x0, &(0x7f0000000740)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") 00:46:22 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, r1, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 00:46:22 executing program 5: 00:46:22 executing program 1: 00:46:22 executing program 4: 00:46:22 executing program 0: 00:46:22 executing program 2: 00:46:22 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 00:46:22 executing program 5: 00:46:22 executing program 1: 00:46:22 executing program 2: 00:46:22 executing program 4: 00:46:22 executing program 0: 00:46:22 executing program 5: 00:46:22 executing program 2: 00:46:22 executing program 1: 00:46:22 executing program 0: [ 379.931807] kauditd_printk_skb: 11 callbacks suppressed [ 379.931821] audit: type=1326 audit(1543884382.623:10651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14424 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:22 executing program 4: 00:46:22 executing program 2: 00:46:23 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 00:46:23 executing program 5: 00:46:23 executing program 1: 00:46:23 executing program 4: 00:46:23 executing program 0: 00:46:23 executing program 2: 00:46:23 executing program 0: 00:46:23 executing program 2: 00:46:23 executing program 1: 00:46:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000140)="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") fsetxattr(r1, 0x0, 0x0, 0x0, 0x0) fchown(r1, 0x0, 0x0) 00:46:23 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) read(r0, 0x0, 0x0) [ 380.781804] audit: type=1326 audit(1543884383.473:10652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14455 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:23 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00'}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000100)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) keyctl$chown(0x4, r1, r2, 0x0) clone(0x201fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) read(r0, &(0x7f0000004d00)=""/4096, 0x100000088) [ 380.972341] input: syz1 as /devices/virtual/input/input24 [ 381.048569] input: syz1 as /devices/virtual/input/input25 [ 381.089771] input: syz1 as /devices/virtual/input/input26 [ 381.122354] input: syz1 as /devices/virtual/input/input27 00:46:24 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r1, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 00:46:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x0, 0x0, 0x2, 0x1, 0x80}, 0x20) 00:46:24 executing program 1: rt_sigprocmask(0xfffffffffffffffe, &(0x7f0000834000), 0x0, 0x8) 00:46:24 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00'}) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) 00:46:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x24, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000000c0)={{}, {0x0, @random="79d2106aa561"}, 0x0, {0x2, 0x0, @loopback}, "0000407100eeffffff00000000000200"}) 00:46:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 381.661491] input: syz1 as /devices/virtual/input/input28 [ 381.677649] audit: type=1326 audit(1543884384.363:10653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14498 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 381.690920] FAT-fs (loop0): bogus number of reserved sectors 00:46:24 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 00:46:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00007e5000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f0000000080)) 00:46:24 executing program 4: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000080)='./file0\x00'}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, &(0x7f0000000a80)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x21, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) r0 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz'}, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) socket$netlink(0x10, 0x3, 0x9) keyctl$describe(0x6, r1, &(0x7f0000000100)=""/210, 0xd2) [ 381.718477] FAT-fs (loop0): Can't find a valid FAT filesystem [ 381.737635] input: syz1 as /devices/virtual/input/input29 00:46:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x2c) [ 381.859696] FAT-fs (loop0): bogus number of reserved sectors 00:46:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000080)) [ 381.905404] FAT-fs (loop0): Can't find a valid FAT filesystem 00:46:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 00:46:25 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r1, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 00:46:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000480)="23000000560081aee4f80b00000f00fe0000c36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0xf0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='cgroup.threads\x00', 0x2, 0x0) 00:46:25 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f00000000c0), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={r0, &(0x7f0000000080), 0x0}, 0x18) 00:46:25 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x65, &(0x7f00000000c0), 0x54deded00158a180) setsockopt$sock_attach_bpf(r0, 0x1, 0x1a, &(0x7f00000001c0), 0xfce9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) 00:46:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 00:46:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair(0x1f, 0x0, 0x5, 0x0) 00:46:25 executing program 2: r0 = socket$inet6(0xa, 0x1000002000000802, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'mangle\x00', 0x4, "59cee9df"}, 0x0) [ 382.542685] audit: type=1326 audit(1543884385.233:10654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14556 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 00:46:25 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) 00:46:25 executing program 4: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000080)='./file0\x00'}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, &(0x7f0000000a80)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x21, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) r0 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz'}, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) socket$netlink(0x10, 0x3, 0x9) keyctl$describe(0x6, r1, &(0x7f0000000100)=""/210, 0xd2) 00:46:25 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x803, 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000240)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0xe805, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 00:46:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 00:46:26 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r1, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 00:46:26 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)="68756765746c04000000000000006167655f69725f5aa2f4657300", 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000340)={0x20}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[], &(0x7f0000000100)) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="6367706f75702e6576656e7473003ea55e10a8299d73ee6d72da86f4dbed2f19b52a48a90e618729894c918a4985eb8f6f2c31681f988720c1753c87f13d0361b825fe2f4ac4ad9edbd55eebfe0cee240ff894a14ae0ebe6c841b49bedc14402a1528815b5af7235f0efcee6b1cba8728161d61a1ab8a917c2b5", 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pipe(&(0x7f0000000300)) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0, 0x0, 0x8, 0xe0ffffff, 0x300000000000000}) 00:46:26 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000002c0), 0x4) 00:46:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 00:46:26 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:26 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:26 executing program 2: [ 383.424053] audit: type=1326 audit(1543884386.113:10655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14608 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 00:46:26 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ftruncate(r0, 0x0) 00:46:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 00:46:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) [ 383.863046] audit: type=1326 audit(1543884386.553:10656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14630 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 383.906554] audit: type=1326 audit(1543884386.583:10657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14635 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:26 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = getpgrp(0x0) sched_getattr(r0, &(0x7f0000000000), 0x30, 0x0) 00:46:27 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) [ 384.287709] audit: type=1326 audit(1543884386.973:10658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14644 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:27 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:27 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) [ 384.438716] audit: type=1326 audit(1543884387.123:10659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14653 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:27 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) 00:46:27 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[]) [ 384.642298] audit: type=1326 audit(1543884387.333:10660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14630 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:27 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x1a78, 0x4007ffd, 0x0, 0xb4) 00:46:27 executing program 5: socket$inet6(0xa, 0x803, 0x4) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:27 executing program 4: 00:46:27 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 385.114835] kauditd_printk_skb: 1 callbacks suppressed [ 385.114850] audit: type=1326 audit(1543884387.803:10662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14688 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:27 executing program 0: 00:46:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:46:27 executing program 5: socket$inet6(0xa, 0x803, 0x4) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:27 executing program 4: 00:46:27 executing program 1: [ 385.220760] audit: type=1326 audit(1543884387.903:10663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14653 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:28 executing program 5: socket$inet6(0xa, 0x803, 0x4) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:28 executing program 4: 00:46:28 executing program 1: [ 385.329778] audit: type=1326 audit(1543884388.013:10664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14697 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:28 executing program 0: 00:46:28 executing program 4: 00:46:28 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:28 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:28 executing program 1: [ 385.961723] audit: type=1326 audit(1543884388.653:10665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14723 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:28 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 00:46:28 executing program 0: 00:46:28 executing program 4: 00:46:28 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:28 executing program 1: [ 386.124307] audit: type=1326 audit(1543884388.813:10666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14697 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:28 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x800002, 0x11, r1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8000fffffffe) 00:46:28 executing program 1: r0 = timerfd_create(0x0, 0x0) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0x40085400, &(0x7f0000000000)={0x3}) 00:46:28 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:28 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="f95b2d023c926285718070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000), 0xc) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff35, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 00:46:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000080)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x2060}) [ 386.423181] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 386.481752] audit: type=1804 audit(1543884389.173:10667): pid=14755 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir930659235/syzkaller.cinZBt/372/bus" dev="sda1" ino=17580 res=1 [ 386.563489] audit: type=1804 audit(1543884389.253:10668): pid=14746 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir930659235/syzkaller.cinZBt/372/bus" dev="sda1" ino=17580 res=1 [ 386.603297] audit: type=1804 audit(1543884389.283:10669): pid=14755 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir930659235/syzkaller.cinZBt/372/bus" dev="sda1" ino=17580 res=1 [ 386.625963] audit: type=1804 audit(1543884389.283:10670): pid=14763 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir930659235/syzkaller.cinZBt/372/bus" dev="sda1" ino=17580 res=1 00:46:29 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:29 executing program 1: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 00:46:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='memory.stat\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r0, &(0x7f00000004c0)="9455a141401bfa79f533896ec6df24d750f65c3a1a065785f378153fafa7b53567b05e92d33226c52f553af2f4c074607d6a336a68aa78336b3c686ef7133adfe19ff56aafe0296c108dd643b9c69479102957a4018ceb6b4800d0f84d146bf7a9c8c06aec51fb42e4766f142393803ee6303b4e4b43e3cedec18631a4559916", 0x0, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x0, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000000c0)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000005c0), 0x9f, &(0x7f0000000780)}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000980)='/dev/net/tun\x00', 0x40002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0x0, r2, 0x0, 0xc, &(0x7f0000000680)='memory.stat\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000780)={0x3, 0x70, 0x5, 0x10001, 0xbbb1, 0x0, 0x0, 0x0, 0x800, 0xe, 0x1, 0x0, 0xffffffff, 0x3, 0x0, 0xfffffffffffff60d, 0x5, 0x6, 0x4, 0x100000, 0x8, 0x4a4, 0xaa0f, 0x4, 0x3, 0x1000, 0x2, 0x2301, 0x7, 0x8, 0x7, 0x2, 0x9, 0x99, 0x0, 0x200, 0x9, 0x0, 0x0, 0xb019, 0x4, @perf_bp={0x0, 0x7}, 0x284, 0x1ff, 0x7, 0x7, 0x6, 0x4, 0x5107d321}, r6, 0xe, 0xffffffffffffffff, 0x7e176f6095df32cc) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f0000000200)=""/216, 0xd8}}, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffc) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f00000009c0)=ANY=[@ANYBLOB="08000000000000000000000000000000000000000000000000000000000000000000000000000000dbf355972cb50b01e23a9b36b9e36ce98b6fa5ab05b5f56bde9161e83af0711fae63ff37b2b8e188c9d63b116afbeafe24d09183a469d8ff3e7bb5a273ca531bd1bce2a4dd84d932e4de0fdf32ca9d632404f759d9479ffebcb77b999a22e5132c88bdbe160d9e05b558e317fc308739735c51016590cc82d8077750df973dd587d3c9a6f82a98dcec448bd6f2895b3b33122637affbdbfdec4f23282ba7aa643cc4cda5c1753760431abffec0d4d8386e73f8168f8704b00dabdd981ddf8188639008c925fb4624c353a9e99567508f67"]) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) write$cgroup_type(r5, &(0x7f0000001900)="746888646164656400", 0xfdef) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$kcm(r8, &(0x7f00000006c0)={&(0x7f0000000600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @broadcast}, 0x3, 0x2, 0x3, 0x1}}, 0x80, 0x0}, 0x20004091) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000bc0)={r0, &(0x7f0000000300)="827021baca", 0x0}, 0x18) 00:46:29 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:29 executing program 2: socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:46:29 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 00:46:29 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) sendto$inet6(r0, &(0x7f0000000040)="ae126edb7f6896c12038", 0xa, 0x0, 0x0, 0x0) 00:46:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) recvmmsg(r0, &(0x7f0000007b40)=[{{0x0, 0x0, &(0x7f0000003680)=[{&(0x7f0000003400)=""/98, 0x62}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 386.896561] audit: type=1326 audit(1543884389.583:10671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=14777 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 00:46:29 executing program 0: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000002c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)="3a2e3a286e6f64657627dc776c616e302e7472757374656476626f786e6574312d2600"}, 0x30) gettid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", 0x0, 0x69}, 0x28) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x400000000000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 00:46:29 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) [ 387.000205] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:46:29 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x40096101, 0x20000000) [ 387.111790] device nr0 entered promiscuous mode 00:46:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0xd) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:29 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) [ 387.232053] QAT: Device 95 not found 00:46:29 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) open(0x0, 0x1410c2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x40) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0x1) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000500)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, &(0x7f0000000240), 0x20000102000007) pwrite64(r1, &(0x7f0000000600)="cba1934cd19f71284c6f15b0ba525346b8432ce852b7319a15878f0debb4303dd977dca422e650b369c0352f04cb39af66332a59431e514f6aa37737b2c583d82f6a687e01392dff0f67ba5c5bc60be26d22a9192498c92a9dad013ab8a26dabd3f349635ff5e792874102b70f02df88bced944c98fe", 0x76, 0x23) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) fcntl$setstatus(r3, 0x4, 0x6c00) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) close(r4) mount$bpf(0x20000000, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000000c0)={0x0, 0x34, 0x6, 0x0, 0x0, 0x3, 0x6, 0x0, 0x400000000}) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000006c0)={0x15, 0xe8, &(0x7f0000000880)="bd02067b4e3afcf389eabd291c635188fb91e2ff3525d7484d134e1562fb302d3dbacff525601bc49c9dc7586d8ff63ced03cf88164fa0dd32713a0106a3231854f35170a1d74736c14ef1c59e7bb1d6ff0db4c58261dd7d2be336547e0beb94da3b82c2ce381f5841bdbe469a182277b1f74ca7fb8f7b367122d75fbf1f300e45955c7ef7839c9b675bb1d7359dddad5b7dad8507dbfad3575f718e1816e1e1e2420f03a2e7b8cfbb4dd7cb58d6cc7dbb10f50172102d22690a2dd44b4b6d7c9a63392593c02cd23e0e42a7629594c470cab5c884471d61de51d75d0065edf49082c38af73c3ace"}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x8004) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000740)) 00:46:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='memory.stat\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r0, &(0x7f00000004c0)="9455a141401bfa79f533896ec6df24d750f65c3a1a065785f378153fafa7b53567b05e92d33226c52f553af2f4c074607d6a336a68aa78336b3c686ef7133adfe19ff56aafe0296c108dd643b9c69479102957a4018ceb6b4800d0f84d146bf7a9c8c06aec51fb42e4766f142393803ee6303b4e4b43e3cedec18631a4559916", 0x0, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x0, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000000c0)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000005c0), 0x9f, &(0x7f0000000780)}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000980)='/dev/net/tun\x00', 0x40002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0x0, r2, 0x0, 0xc, &(0x7f0000000680)='memory.stat\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000780)={0x3, 0x70, 0x5, 0x10001, 0xbbb1, 0x0, 0x0, 0x0, 0x800, 0xe, 0x1, 0x0, 0xffffffff, 0x3, 0x0, 0xfffffffffffff60d, 0x5, 0x6, 0x4, 0x100000, 0x8, 0x4a4, 0xaa0f, 0x4, 0x3, 0x1000, 0x2, 0x2301, 0x7, 0x8, 0x7, 0x2, 0x9, 0x99, 0x0, 0x200, 0x9, 0x0, 0x0, 0xb019, 0x4, @perf_bp={0x0, 0x7}, 0x284, 0x1ff, 0x7, 0x7, 0x6, 0x4, 0x5107d321}, r6, 0xe, 0xffffffffffffffff, 0x7e176f6095df32cc) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f0000000200)=""/216, 0xd8}}, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffc) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f00000009c0)=ANY=[@ANYBLOB="08000000000000000000000000000000000000000000000000000000000000000000000000000000dbf355972cb50b01e23a9b36b9e36ce98b6fa5ab05b5f56bde9161e83af0711fae63ff37b2b8e188c9d63b116afbeafe24d09183a469d8ff3e7bb5a273ca531bd1bce2a4dd84d932e4de0fdf32ca9d632404f759d9479ffebcb77b999a22e5132c88bdbe160d9e05b558e317fc308739735c51016590cc82d8077750df973dd587d3c9a6f82a98dcec448bd6f2895b3b33122637affbdbfdec4f23282ba7aa643cc4cda5c1753760431abffec0d4d8386e73f8168f8704b00dabdd981ddf8188639008c925fb4624c353a9e99567508f67"]) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) write$cgroup_type(r5, &(0x7f0000001900)="746888646164656400", 0xfdef) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$kcm(r8, &(0x7f00000006c0)={&(0x7f0000000600)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @broadcast}, 0x3, 0x2, 0x3, 0x1}}, 0x80, 0x0}, 0x20004091) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000bc0)={r0, &(0x7f0000000300)="827021baca", 0x0}, 0x18) 00:46:30 executing program 3: seccomp(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:30 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001440)=[{&(0x7f00000001c0)=""/18, 0x12}], 0x1, 0x0) 00:46:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:30 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) [ 387.840139] dlm: non-version read from control device 18 00:46:30 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:30 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') setxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file3\x00', &(0x7f0000000000)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x100000000000001) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) close(0xffffffffffffffff) 00:46:30 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) 00:46:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x74, 0x4, 0x3}, 0xd) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f0000000180)="174854dde8fcf08c357f28bbbdca31d9651887aade366b2a3e419d560da85595a379afd54ae3d217f492b55544ee8f0114ccfe38e7d92ebe5cf9dc0415c05921564a4c510805f266122446c9c87dacbfc75e0edaee93ebabe09d60544aab79a09579abef9d4cf0a73bbcc5b75e5b6e9224feb98fda801858027710ca6a4d65d575a2dce991f2", 0x0}, 0x18) [ 387.996117] device nr0 entered promiscuous mode 00:46:30 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="50000000905a0000"], 0x0) 00:46:30 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/114, 0x4a) 00:46:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000002c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, r0, 0x0, 0x23, &(0x7f0000000280)="3a2e3a286e6f64657627dc776c616e302e7472757374656476626f786e6574312d2600"}, 0x30) r1 = gettid() write$cgroup_pid(r0, &(0x7f00000005c0)=r1, 0xfffffffffffffd87) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0x50, &(0x7f0000000400)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000100)='cpuset\x00', r2}, 0x30) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='cpuset\x00') r4 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30e) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x1800000000000006, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", 0x0, 0x69}, 0x28) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x400000000000000) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)=r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg$kcm(r4, &(0x7f0000002f40)={&(0x7f0000002e00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002ec0), 0x0, &(0x7f0000002f00)=""/52, 0x34, 0x5}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x401) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000002f80)=r6) 00:46:31 executing program 5: socket$inet6(0xa, 0x803, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 00:46:31 executing program 3: seccomp(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:31 executing program 0: 00:46:31 executing program 5: socket$inet6(0xa, 0x803, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:31 executing program 2: 00:46:31 executing program 0: 00:46:31 executing program 4: 00:46:31 executing program 5: socket$inet6(0xa, 0x803, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:31 executing program 1: 00:46:31 executing program 0: 00:46:31 executing program 4: 00:46:31 executing program 1: 00:46:31 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:32 executing program 2: 00:46:32 executing program 1: 00:46:32 executing program 0: 00:46:32 executing program 4: 00:46:32 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:32 executing program 0: 00:46:32 executing program 4: 00:46:32 executing program 1: 00:46:32 executing program 2: 00:46:32 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:32 executing program 1: 00:46:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:32 executing program 4: 00:46:32 executing program 0: 00:46:32 executing program 2: 00:46:32 executing program 4: 00:46:32 executing program 2: 00:46:32 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:32 executing program 0: 00:46:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:32 executing program 1: 00:46:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='reno\x00', 0x5) 00:46:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:32 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x840) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000040)) 00:46:33 executing program 4: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) 00:46:33 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:33 executing program 0: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000002c0)="bcf6", 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x6) lchown(0x0, 0x0, 0x0) 00:46:33 executing program 1: 00:46:33 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r1, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 00:46:33 executing program 4: 00:46:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)) 00:46:33 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1, 0xc, 0x249e21, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x20) 00:46:33 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:33 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x7fc, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f00000003c0)={0x1, 0x1, 0x2, 0x7}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) get_robust_list(0x0, &(0x7f0000000580)=&(0x7f0000000540)={&(0x7f0000000480), 0x0, &(0x7f0000000500)}, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x8000000000003) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) rmdir(&(0x7f0000001700)='./file0\x00') close(r2) r3 = socket(0x840000000002, 0x3, 0xff) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) syslog(0x9, &(0x7f0000000380)=""/51, 0xffffff47) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) r5 = syz_open_procfs(0x0, &(0x7f0000000740)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r3, r5, &(0x7f0000000180), 0x100000001) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) getresgid(&(0x7f00000017c0), &(0x7f00000053c0), &(0x7f0000005400)) sendmsg$netlink(r4, &(0x7f0000005500)={&(0x7f0000001740)=@proc={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc, &(0x7f0000001780)=[{&(0x7f00000018c0)=ANY=[@ANYBLOB="10000025bd7000fbdbdf250000008000"], 0x1}], 0x1, 0x0, 0x0, 0x20000000}, 0x4000004) 00:46:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{}, {}, 0x0, {0x2, 0x0, @dev}}) 00:46:33 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r1, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 00:46:33 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:33 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x62e8cd72) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x51, r0, 0x0) 00:46:33 executing program 2: time(&(0x7f0000000080)) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) epoll_create1(0x80000) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) r1 = epoll_create1(0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/attr/current\x00', 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x20000000, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000200)) r2 = dup(r1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x817) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) dup(r2) io_setup(0x7, &(0x7f0000000280)) exit(0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x1cde) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) fsetxattr$security_smack_transmute(r3, &(0x7f0000000380)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000480)='TRUE', 0x4, 0x2) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001bc0)=ANY=[], 0x0) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000500)={@multicast2, @remote}, &(0x7f0000000540)=0x8) 00:46:33 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x4000000000089f6, &(0x7f0000000000)={"736974300000000400", @ifru_flags}) 00:46:33 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r1, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 00:46:33 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'team_slave_1\x00', 0x4fff}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000500), &(0x7f0000000540)=0x14) accept4(0xffffffffffffff9c, &(0x7f0000000a00)=@hci, &(0x7f0000000a80)=0x80, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) accept(r2, &(0x7f0000000b40)=@hci, &(0x7f0000000bc0)=0x80) accept4$packet(0xffffffffffffff9c, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/67) lstat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) setregid(r4, 0x0) ftruncate(r3, 0x2007fff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r3, &(0x7f0000000680), 0x8000fffffffe) setsockopt$inet6_tcp_int(r2, 0x6, 0x33, &(0x7f0000000400), 0x4) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000580)=""/197) 00:46:33 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:33 executing program 4: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) clone(0x82102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x7af}, {0x6}]}) mmap(&(0x7f000029b000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 391.205282] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 391.438776] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:46:34 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x7fc, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f00000003c0)={0x1, 0x1, 0x2, 0x7}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) get_robust_list(0x0, &(0x7f0000000580)=&(0x7f0000000540)={&(0x7f0000000480), 0x0, &(0x7f0000000500)}, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x8000000000003) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) rmdir(&(0x7f0000001700)='./file0\x00') close(r2) r3 = socket(0x840000000002, 0x3, 0xff) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) syslog(0x9, &(0x7f0000000380)=""/51, 0xffffff47) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) r5 = syz_open_procfs(0x0, &(0x7f0000000740)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r3, r5, &(0x7f0000000180), 0x100000001) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) getresgid(&(0x7f00000017c0), &(0x7f00000053c0), &(0x7f0000005400)) sendmsg$netlink(r4, &(0x7f0000005500)={&(0x7f0000001740)=@proc={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc, &(0x7f0000001780)=[{&(0x7f00000018c0)=ANY=[@ANYBLOB="10000025bd7000fbdbdf250000008000"], 0x1}], 0x1, 0x0, 0x0, 0x20000000}, 0x4000004) 00:46:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:34 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/mnt\x00') 00:46:34 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:34 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x7fc, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f00000003c0)={0x1, 0x1, 0x2, 0x7}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) get_robust_list(0x0, &(0x7f0000000580)=&(0x7f0000000540)={&(0x7f0000000480), 0x0, &(0x7f0000000500)}, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x8000000000003) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) rmdir(&(0x7f0000001700)='./file0\x00') close(r2) r3 = socket(0x840000000002, 0x3, 0xff) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) syslog(0x9, &(0x7f0000000380)=""/51, 0xffffff47) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) r5 = syz_open_procfs(0x0, &(0x7f0000000740)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r3, r5, &(0x7f0000000180), 0x100000001) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) getresgid(&(0x7f00000017c0), &(0x7f00000053c0), &(0x7f0000005400)) sendmsg$netlink(r4, &(0x7f0000005500)={&(0x7f0000001740)=@proc={0x10, 0x0, 0x25dfdbfe, 0x1}, 0xc, &(0x7f0000001780)=[{&(0x7f00000018c0)=ANY=[@ANYBLOB="10000025bd7000fbdbdf250000008000"], 0x1}], 0x1, 0x0, 0x0, 0x20000000}, 0x4000004) 00:46:34 executing program 2: time(&(0x7f0000000080)) clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) epoll_create1(0x80000) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) r1 = epoll_create1(0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/attr/current\x00', 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x20000000, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000200)) r2 = dup(r1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001980)=ANY=[@ANYBLOB="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"], 0x817) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) dup(r2) io_setup(0x7, &(0x7f0000000280)) exit(0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x1cde) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) fsetxattr$security_smack_transmute(r3, &(0x7f0000000380)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000480)='TRUE', 0x4, 0x2) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001bc0)=ANY=[], 0x0) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000500)={@multicast2, @remote}, &(0x7f0000000540)=0x8) 00:46:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000180)=0x4, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 00:46:34 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000002c0)=0x980, 0x4) 00:46:34 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000000)={"626f6e6430000000000600000100", @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) 00:46:35 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) futex(&(0x7f0000000000), 0x3, 0x0, 0x0, &(0x7f00000000c0), 0x0) 00:46:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:35 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 392.639172] kauditd_printk_skb: 2 callbacks suppressed [ 392.639187] audit: type=1326 audit(1543884395.323:10674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=15124 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0xb, 0x8, 0x100000001, 0x8000000002, 0x1, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) 00:46:35 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:35 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0xb, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000004df14ed1c5e25de8247a2f588d21cdaace544e53765e31711f7eaf4a0e876d1693732af1932548e18c21787669db8b3f06ff6418cf0f738f9c1106b500000000000000"], 0x0, 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r2, r1, 0xd}, 0x10) 00:46:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:35 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:35 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0xb, 0x8, 0x100000001, 0x8000000002, 0x1, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x18) 00:46:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:35 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:36 executing program 4: 00:46:36 executing program 0: r0 = socket$kcm(0xa, 0x100000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000080), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, 0x0, 0x0) 00:46:36 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:36 executing program 2: 00:46:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:36 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 393.356377] audit: type=1326 audit(1543884396.043:10675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=15124 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:36 executing program 2: 00:46:36 executing program 0: 00:46:36 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) sendto$inet6(r1, 0x0, 0x0, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 00:46:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@in6={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfec00000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3]}}, 0x80, 0x0}, 0x0) 00:46:36 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 393.746646] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:46:36 executing program 0: 00:46:36 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:36 executing program 4: 00:46:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:36 executing program 2: 00:46:36 executing program 0: 00:46:36 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:36 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:36 executing program 4: 00:46:36 executing program 2: 00:46:36 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:36 executing program 0: 00:46:36 executing program 2: 00:46:37 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:37 executing program 0: 00:46:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:37 executing program 4: 00:46:37 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:37 executing program 2: 00:46:37 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:37 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:37 executing program 0: 00:46:37 executing program 4: 00:46:37 executing program 2: 00:46:37 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:37 executing program 4: 00:46:37 executing program 0: 00:46:37 executing program 2: 00:46:37 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:37 executing program 4: 00:46:37 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000005c0)=ANY=[]) 00:46:37 executing program 2: 00:46:37 executing program 0: 00:46:37 executing program 4: 00:46:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:37 executing program 2: 00:46:37 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, 0x0) 00:46:37 executing program 0: 00:46:37 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:37 executing program 4: 00:46:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) fchdir(0xffffffffffffffff) 00:46:38 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, 0x0) 00:46:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) pipe2(&(0x7f0000000000), 0x0) 00:46:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:38 executing program 4: r0 = socket(0x1e, 0x400000000000004, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x0, 0x73d}, 0x29b) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:46:38 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, 0x0) [ 395.491567] audit: type=1326 audit(1543884398.173:10676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=15331 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 395.553570] audit: type=1326 audit(1543884398.233:10677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=15337 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:38 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:38 executing program 4: r0 = socket(0x1e, 0x400000000000004, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x0, 0x73d}, 0x29b) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:46:38 executing program 5: r0 = socket(0x1e, 0x400000000000004, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3, 0x73d}, 0x29b) recvmmsg(r0, &(0x7f0000006c80)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000580)=""/186, 0xba}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x101d0, 0x0, 0x0, 0x0) 00:46:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000001ec0)={0x11, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x68, 0x1018}}, &(0x7f00000000c0)='GPL\x00', 0x7, 0xb9, &(0x7f0000000100)=""/185}, 0x48) 00:46:38 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004fc0)=[{{0x0, 0x0, &(0x7f0000002600)=[{&(0x7f00000015c0)=""/64, 0x40}, {&(0x7f0000001600)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 00:46:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x7f) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000440), 0x0, 0x20000004, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in=@loopback, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000500)=0xe8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00', 0x101}) [ 396.238947] audit: type=1326 audit(1543884398.923:10678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=15331 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:39 executing program 0: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x80000) 00:46:39 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:39 executing program 4: mkdir(&(0x7f0000dda000)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, 0x0) 00:46:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 396.303479] audit: type=1326 audit(1543884398.993:10679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=15337 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 396.332781] device lo entered promiscuous mode 00:46:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 00:46:39 executing program 1: r0 = creat(0x0, 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@setlink={0x2c, 0x13, 0x311, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_ADDRESS={0xc}]}, 0x2c}}, 0x0) 00:46:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x81) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) 00:46:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000000)=0x1, 0x394) recvmmsg(0xffffffffffffffff, &(0x7f0000007440)=[{{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000002600)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000002580)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000400)=@sco, 0x359, &(0x7f0000000a80), 0x26c, &(0x7f0000000c40)}}], 0x4000000000002f0, 0x0) 00:46:39 executing program 1: r0 = creat(0x0, 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:39 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 00:46:39 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x2}}}}}, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:46:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x5, 0x3, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x23, 0x4, 0x1, 0x0, r0}, 0x2c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), 0x0, 0x3}, 0x20) 00:46:39 executing program 1: r0 = creat(0x0, 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:39 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:46:39 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x2}}}}}, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:46:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x81) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) 00:46:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x0) 00:46:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:40 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) inotify_init1(0x0) inotify_init() r0 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) 00:46:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x2}}}}}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 00:46:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:40 executing program 2: sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000180)) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:46:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x5, 0x3, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x23, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), 0x0, 0x3}, 0x20) 00:46:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:40 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{}, {0x0, 0x5}}, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/8, 0x8}], 0x2b9) 00:46:41 executing program 0: 00:46:41 executing program 4: 00:46:41 executing program 2: 00:46:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:41 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) inotify_init1(0x0) inotify_init() r0 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) 00:46:41 executing program 2: 00:46:41 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:41 executing program 0: 00:46:41 executing program 4: 00:46:41 executing program 2: 00:46:41 executing program 4: 00:46:41 executing program 0: 00:46:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:41 executing program 4: 00:46:41 executing program 2: 00:46:41 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:41 executing program 5: 00:46:41 executing program 4: 00:46:41 executing program 0: 00:46:41 executing program 2: 00:46:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:41 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, 0x0, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:42 executing program 2: 00:46:42 executing program 0: 00:46:42 executing program 4: 00:46:42 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, 0x0, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:42 executing program 0: 00:46:42 executing program 5: 00:46:42 executing program 2: 00:46:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:42 executing program 4: 00:46:42 executing program 0: 00:46:42 executing program 2: 00:46:42 executing program 5: 00:46:42 executing program 4: 00:46:42 executing program 0: 00:46:42 executing program 4: 00:46:42 executing program 2: 00:46:42 executing program 5: 00:46:42 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, 0x0, 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000015c0)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000080)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001300)="6769bce77b64c54f6be41765d3c62759", 0x10}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1}, 0x0) 00:46:42 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x1, &(0x7f0000000140)="c8", 0x1) 00:46:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0x6d, 0x0, 0x0, 0x0, 0x13, 0xffffffd5}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 00:46:42 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:46:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:46:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x8004c00, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, 0x32, 0x829, 0x0, 0x0, {0x2801, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0x700000000000000}}]}]}, 0x2c}}, 0x0) 00:46:42 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0xf, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="180800000500000000000000020000001a919bffb4afa5b1"], 0x0, 0x6, 0x1000, &(0x7f00000000c0)=""/4096, 0x41100, 0x1, [], 0x0, 0x7}, 0x48) [ 400.240195] netlink: set zone limit has 4 unknown bytes 00:46:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x4}}, 0x1c) sendmsg$netlink(r0, &(0x7f0000005b80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000005a80)=[@rights={0x10}], 0x10}, 0x0) 00:46:43 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xe, 0x0, 0xfffffdfd}}) 00:46:43 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f00000000c0)=0x80, 0x800) iopl(0x3) 00:46:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = getpgrp(0xffffffffffffffff) kcmp(r0, r0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) 00:46:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f00000001c0)='./bus\x00', 0x0) [ 400.531317] audit: type=1326 audit(1543884403.213:10680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=15677 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:43 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f00000001c0)="a61c954ec4ec4039545a05425f62e5c656c13566ea9c889193c00dbb13d535a40cab914bc09a3bce14ab95926f83c57b7a27ca9e24ecc6", 0x37) 00:46:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x800) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000200)="96", 0x1}], 0x1) [ 400.633122] audit: type=1326 audit(1543884403.323:10681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=15696 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:43 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f00000000c0)=0x7fff, 0x4) 00:46:43 executing program 0: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f00002cb000)={0x0, r0}) recvmsg(r2, &(0x7f000070bfc8)={0x0, 0x0, 0x0}, 0x0) prlimit64(0x0, 0xb, &(0x7f0000000000), 0x0) dup2(r1, r2) tkill(r0, 0x16) 00:46:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:46:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000180)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 00:46:43 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:43 executing program 2: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f00002cb000)={0x0, r0}) recvmsg(r2, &(0x7f000070bfc8)={0x0, 0x0, 0x0}, 0x0) prlimit64(0x0, 0xb, &(0x7f0000000000), 0x0) dup2(0xffffffffffffffff, r2) tkill(r0, 0x16) 00:46:44 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000900)=@getroute={0x14, 0x1a, 0x1c974209d04c2781}, 0x14}}, 0x0) 00:46:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 401.254526] audit: type=1326 audit(1543884403.943:10682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=15677 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:44 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) recvmsg(r0, &(0x7f0000000100)={&(0x7f0000000280)=@nl=@proc, 0x80, 0x0}, 0x2000) 00:46:44 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) capset(0x0, &(0x7f0000000000)={0x0, 0x41e49f14}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000180)={[{}, {0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 00:46:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x3a, 0x0, "8936b5f7ba111299d10b9d1b42ea247184d2ac84610c016ac3b7519effc61150ad6f9d61511f111f8659e2dd26e64b223ee83dd60564e64daf8cf648ccba5be8350c8cde493ed52582bd607a9f96823d"}, 0xd8) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r2) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x1a78, 0x4007ffd, 0x0, 0xb4) [ 401.431912] audit: type=1326 audit(1543884404.123:10683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=15696 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 401.548416] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:46:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x6, 0x25510223, 0x4}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0a5c1f023c126285719070") ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x2a8, 0x0, 0x0, 0x0, 0x4}) 00:46:46 executing program 0: utimes(0x0, &(0x7f0000000140)={{}, {0x77359400}}) 00:46:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000080)) 00:46:46 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:46 executing program 5: ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_hci(r0, 0x0, 0x60, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x44) 00:46:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000220001040000000000020000000000006eae49780733d89af80571519c35d5157831477088627879c649cd4fa041713be9e2a72f828e4b26a554a2080000002545ec642bb62e69198bb70647ef56cfedc7d109a94562ab902f8f05560500b4df1fb4a736393ca5743a5b300648f3f85a259344df2fc02a1c559ecc15f7fa9e2dba9b27a360c7cd51735fe00b06b77b65a328e4dffe64b7f4ef7f6c7c5fe48d"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x8}, 0x0) 00:46:46 executing program 4: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x4000, 0x0) 00:46:46 executing program 3: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600"], 0x5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:46:46 executing program 5: truncate(0x0, 0x0) 00:46:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 00:46:46 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0xb, 0x8, 0x100000001, 0x8000000001, 0x1, 0xffffffffffffff9c}, 0x3ba) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x3, 0x0, 0x73fffb, 0x0, 0x20820000, r0}, 0x15) 00:46:46 executing program 2: r0 = socket(0xa, 0x802, 0x0) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f00000000c0)) 00:46:46 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000000c0)={@multicast1, @local}, 0x8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 00:46:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0xffffffffffffffff) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 00:46:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ashmem\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/fib_triestat\x00') connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000000)=0x1, 0x394) sendmmsg(r0, &(0x7f0000002580)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000400)=@sco, 0x359, &(0x7f0000000a80), 0x26c, &(0x7f0000000c40)}}], 0x4000000000002f0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c7465720000000004000000000000000000000000000000000000000000ae00000000000d00000000000000000000000000000000910000000000000000000000000000000000000000000000000000000000000000000000001e000000000000000000001400"], 0x1) 00:46:46 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:47 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000140)=[{r0}], 0x1, 0x0, &(0x7f0000000040), 0x8) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r1) 00:46:47 executing program 0: r0 = inotify_init1(0x0) r1 = inotify_init() mknod$loop(&(0x7f0000000400)='./file0\x00', 0x0, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x8000000b) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0xa400295c) 00:46:47 executing program 2: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000080)='./file0\x00'}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20245e5e90096cd3689b2089acba2bc09834181e1e53ee5aa0c5b0635549ea2e9b4c315b483ea279460000000000000000000000000000"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)={0xffffffffffffffff}) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) write$binfmt_script(r0, &(0x7f0000000480)={'#! ', './file0', [{0x20, 'icmp6\x00'}, {0x20, '}'}], 0xa, "23bc1661abbf9be54770b6ac1f0e5c8adbcdf5976c39455835cdb05f3ddd5d80ce992ae78881a107d7ae4e517e2f605be349fe68ff1c1d2ac9120f97cd42f9fe9225a7e03865e6f32a99c40f1405a48eb53950bacce2a49efa2bcb12062967a9fb4f7c3e929216d0396fe4f1fc91fa3ad167e98b5526d16366c1277df3346a9b"}, 0x94) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="0180c200000000000000000081000000000c0000000000000000911aab5cc21f21b9cd4cec2e61e28c3a6f545298c266a9efbfae1d119af8d9164f7c46b0a19362163b562c1ae4d85affe82e2e34b2631c4d391833bb34039b61923cc0a63ccc61c46eac0e2e827b1378ba1a970a7eb945fdd0fbd36ed72c00000000000000000000"], 0x0) r2 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r2) socket$netlink(0x10, 0x3, 0x9) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xe) keyctl$describe(0x6, r3, &(0x7f0000000100)=""/210, 0xd2) 00:46:47 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:46:47 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$void(r0, 0xc0045878) 00:46:47 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 00:46:47 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(0x0, 0x0, 0x0) 00:46:47 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0xffffffffffffff63) 00:46:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ashmem\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/fib_triestat\x00') connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000000)=0x1, 0x394) sendmmsg(r0, &(0x7f0000002580)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000400)=@sco, 0x359, &(0x7f0000000a80), 0x26c, &(0x7f0000000c40)}}], 0x4000000000002f0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c7465720000000004000000000000000000000000000000000000000000ae00000000000d00000000000000000000000000000000910000000000000000000000000000000000000000000000000000000000000000000000001e000000000000000000001400"], 0x1) 00:46:47 executing program 3: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20245e5e90096cd3689b2089acba2bc09834181e1e53ee5aa0c5b0635549ea2e9b4c315b483ea279460000000000000000000000000000"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)={0xffffffffffffffff}) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) write$binfmt_script(r0, &(0x7f0000000480)={'#! ', './file0', [{0x20, 'icmp6\x00'}, {0x20, '}'}], 0xa, "23bc1661abbf9be54770b6ac1f0e5c8adbcdf5976c39455835cdb05f3ddd5d80ce992ae78881a107d7ae4e517e2f605be349fe68ff1c1d2ac9120f97cd42f9fe9225a7e03865e6f32a99c40f1405a48eb53950bacce2a49efa2bcb12062967a9fb4f7c3e929216d0396fe4f1fc91fa3ad167e98b5526d16366c1277df3346a9b"}, 0x94) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="0180c200000000000000000081000000000c0000000000000000911aab5cc21f21b9cd4cec2e61e28c3a6f545298c266a9efbfae1d119af8d9164f7c46b0a19362163b562c1ae4d85affe82e2e34b2631c4d391833bb34039b61923cc0a63ccc61c46eac0e2e827b1378ba1a970a7eb945fdd0fbd36ed72c00000000000000000000"], 0x0) r2 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r2) socket$netlink(0x10, 0x3, 0x9) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xe) keyctl$describe(0x6, r3, &(0x7f0000000100)=""/210, 0xd2) 00:46:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(r0, &(0x7f0000001b00)={&(0x7f00000005c0)=@in6={0xa, 0x8864, 0x6, @ipv4}, 0x80, 0x0}, 0x0) 00:46:47 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(0x0, 0x0, 0x0) 00:46:47 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\t'], 0x1) close(r0) execve(0x0, 0x0, 0x0) 00:46:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, 0x0, 0x0) 00:46:48 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f00000004c0)='X', 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000040)=0x98) 00:46:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ashmem\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/fib_triestat\x00') connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000000)=0x1, 0x394) sendmmsg(r0, &(0x7f0000002580)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000400)=@sco, 0x359, &(0x7f0000000a80), 0x26c, &(0x7f0000000c40)}}], 0x4000000000002f0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c7465720000000004000000000000000000000000000000000000000000ae00000000000d00000000000000000000000000000000910000000000000000000000000000000000000000000000000000000000000000000000001e000000000000000000001400"], 0x1) 00:46:48 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev}, 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 00:46:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x3, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000300], 0x0, 0x0, &(0x7f0000000300)=[{0x0, '\x00', 0x3, 0xffffffffffffffff}, {}, {}]}, 0x108) 00:46:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000098000000b000000004000000faab9eefe53133137b5284431602740e2d96ca46bd03ca3566c3acdc656545ade02376da4000659a3a4a2a7c2d324d20eba1dc97160216ca283533de3e9da96b89ac43a00895675be0a848713060e10f1693792cb9b728d5b55eec6f3e3a644c44ff3e3599df781761eb4009bcf35ac1f0d03daa7181b059ef308ab550b6a87aedc53ec5df99abaf218d29d79f8000617d831af029000000006dd7eab836ae986c90577cebf66423391930348bb37f52"], 0x0, 0xc8}, 0x20) 00:46:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={"6c6f000600"}) sendmsg$nl_route(r0, &(0x7f0000005700)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000014000300763a7468310000000000000000000000"], 0x1}}, 0x0) 00:46:48 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), 0x0}, 0x20) perf_event_open(&(0x7f0000940000)={0x7, 0x70, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz1\x00', 0x200002, 0x0) [ 405.612700] kernel msg: ebtables bug: please report to author: counter_offset != totalcnt 00:46:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000005c0)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x32) sendmmsg(r1, &(0x7f0000005fc0), 0x5b, 0x0) 00:46:48 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f00000000c0)=@ethtool_ringparam={0xb}}) 00:46:48 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:46:48 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f0000000040)=""/153, 0x81}) 00:46:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x2}) 00:46:48 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f00000000c0)=[{{}, 0x0, 0x0, 0x2}], 0x10) sendfile(r0, r0, &(0x7f0000000180)=0x800000000000003, 0x103ffff7f) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r2, r1, 0x0, 0xfff) 00:46:48 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) fadvise64(r0, 0x4c, 0x0, 0x0) [ 406.044397] audit: type=1804 audit(1543884408.733:10684): pid=15962 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir066628889/syzkaller.6QfNuJ/433/file0" dev="sda1" ino=16737 res=1 [ 406.085561] audit: type=1804 audit(1543884408.733:10685): pid=15962 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir066628889/syzkaller.6QfNuJ/433/file0" dev="sda1" ino=16737 res=1 [ 406.108921] audit: type=1804 audit(1543884408.733:10686): pid=15964 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir066628889/syzkaller.6QfNuJ/433/file0" dev="sda1" ino=16737 res=1 00:46:49 executing program 1: 00:46:49 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) close(r0) 00:46:49 executing program 0: io_setup(0x1f6a, &(0x7f0000000040)=0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 00:46:49 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001a00e5ef007f00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:46:49 executing program 2: 00:46:49 executing program 5: 00:46:49 executing program 2: 00:46:49 executing program 5: r0 = socket(0x10, 0x80002, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="0000ff1b0012000c000100626f6e64000000000c00020008000900ffffffffbb3e81acb590d0f3dbf66544c7d2a1750c04e6f2ef9249e42312eabb0be536af1e582234d890cd0eba5afa38e08ca1bfc717ec50f600001b814eaf1e2875a4129afb4386081137e0233f736d325523ce10edd1583a3ae8196b4268017985"], 0x1}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 00:46:49 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000dc9ff0)={0x2, 0x4e20}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x60, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f00000018c0)=0x8000000001, 0x4) accept(r0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000200)="3062447c201f7800d7aac56b7c1ddb1601207a73c78532774aab10a1e0ac8bceaad4e9da1d22baf2a0fc4d856d28a56db1d54e1ee63238d7f120d84386b52e4f3d40e0eac27a9dc4a1f2365efe9a0b48ab82670c40a50b05f35415a8f217861c446ecc65412f46468afd2d726d6ddead2ad9a1e4d00f", 0x76, 0x4007ffd, 0x0, 0x0) 00:46:49 executing program 4: 00:46:49 executing program 1: 00:46:49 executing program 0: 00:46:49 executing program 2: 00:46:49 executing program 4: 00:46:49 executing program 5: 00:46:49 executing program 3: 00:46:49 executing program 2: 00:46:49 executing program 1: 00:46:49 executing program 0: 00:46:49 executing program 5: 00:46:49 executing program 2: 00:46:49 executing program 4: 00:46:49 executing program 3: 00:46:49 executing program 5: 00:46:49 executing program 0: 00:46:49 executing program 1: 00:46:49 executing program 2: 00:46:49 executing program 4: 00:46:49 executing program 0: 00:46:49 executing program 3: 00:46:50 executing program 2: 00:46:50 executing program 1: 00:46:50 executing program 5: 00:46:50 executing program 4: 00:46:50 executing program 0: 00:46:50 executing program 3: 00:46:50 executing program 5: 00:46:50 executing program 2: 00:46:50 executing program 1: 00:46:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) 00:46:50 executing program 3: socket(0xa, 0x802, 0x88) sched_setaffinity(0x0, 0xffffffffffffffb1, &(0x7f0000000180)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0x0, 0x20000004, 0x0, 0x0) 00:46:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) get_robust_list(0x0, 0x0, 0x0) rename(0x0, &(0x7f0000000200)='./file0\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{&(0x7f0000003980)=@rc, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1, &(0x7f0000002c00)=""/125, 0x7d}}], 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:46:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000340)) 00:46:50 executing program 5: 00:46:50 executing program 4: 00:46:50 executing program 1: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20245e5e90096cd3689b2089acba2bc09834181e1e53ee5aa0c5b0635549ea2e9b4c315b483ea279460000000000000000000000000000"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$RTC_VL_CLR(r0, 0x7014) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) r1 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) socket$netlink(0x10, 0x3, 0x9) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xe) keyctl$describe(0x6, r2, &(0x7f0000000100)=""/210, 0xd2) 00:46:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000100)={@remote}, 0x14) 00:46:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x8410}, 0xc) 00:46:50 executing program 0: prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) 00:46:50 executing program 1: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20245e5e90096cd3689b2089acba2bc09834181e1e53ee5aa0c5b0635549ea2e9b4c315b483ea279460000000000000000000000000000"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$RTC_VL_CLR(r0, 0x7014) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) r1 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) socket$netlink(0x10, 0x3, 0x9) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xe) keyctl$describe(0x6, r2, &(0x7f0000000100)=""/210, 0xd2) 00:46:50 executing program 4: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20245e5e90096cd3689b2089acba2bc09834181e1e53ee5aa0c5b0635549ea2e9b4c315b483ea279460000000000000000000000000000"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$RTC_VL_CLR(r0, 0x7014) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) r1 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) socket$netlink(0x10, 0x3, 0x9) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xe) keyctl$describe(0x6, r2, &(0x7f0000000100)=""/210, 0xd2) 00:46:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) 00:46:50 executing program 5: socket$inet6(0xa, 0x401000000001, 0x0) close(0xffffffffffffffff) socket$unix(0x1, 0x801, 0x0) socket$unix(0x1, 0x0, 0x0) request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0xfffffffffffffffd) rmdir(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 00:46:50 executing program 2: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000080)='./file0\x00'}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20245e5e90096cd3689b2089acba2bc09834181e1e53ee5aa0c5b0635549ea2e9b4c315b483ea279460000000000000000000000000000"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000000000000712600000000000035060000ff000000bf25000000000000070500000e0000000f65000000000000bf5400000000000007040000040000003d4301000000000095000000000000006154000000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d43010000000000950000000000000061540000000000006b25000000000000070500000e0000000f6500000000000027050000040000000f65000000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b7000000000000009500000000000000"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)={0xffffffffffffffff}) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) write$binfmt_script(r0, &(0x7f0000000480)={'#! ', './file0', [{0x20, 'icmp6\x00'}, {0x20, '}'}], 0xa, "23bc1661abbf9be54770b6ac1f0e5c8adbcdf5976c39455835cdb05f3ddd5d80ce992ae78881a107d7ae4e517e2f605be349fe68ff1c1d2ac9120f97cd42f9fe9225a7e03865e6f32a99c40f1405a48eb53950bacce2a49efa2bcb12062967a9fb4f7c3e929216d0396fe4f1fc91fa3ad167e98b5526d16366c1277df3346a9b"}, 0x94) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="0180c200000000000000000081000000000c0000000000000000911aab5cc21f21b9cd4cec2e61e28c3a6f545298c266a9efbfae1d119af8d9164f7c46b0a19362163b562c1ae4d85affe82e2e34b2631c4d391833bb34039b61923cc0a63ccc61c46eac0e2e827b1378ba1a970a7eb945fdd0fbd36ed72c00000000000000000000"], 0x0) r2 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r2) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xe) keyctl$describe(0x6, r3, &(0x7f0000000100)=""/210, 0xd2) 00:46:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000140), 0xc) 00:46:50 executing program 3: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{&(0x7f0000003980)=@rc, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1, &(0x7f0000002c00)=""/125, 0x7d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:46:50 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 00:46:51 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000000)=0x1, 0x394) sendmmsg(r0, &(0x7f0000002580)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000400)=@sco, 0x359, &(0x7f0000000a80), 0x26c, &(0x7f0000000c40)}}], 0x4000000000002f0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="66696c7465720000000004000000000000000000000000000000000000000000ae00000000000d00000000000000000000000000000000910000000000000000000000000000000000000000000000000000000000000000000000001e000000000000000000001400"], 0x1) 00:46:51 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) dup3(r2, r1, 0x0) 00:46:51 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000), 0x0) 00:46:51 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x12921d4d, 0x1}, 0x10) 00:46:51 executing program 1: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20245e5e90096cd3689b2089acba2bc09834181e1e53ee5aa0c5b0635549ea2e9b4c315b483ea279460000000000000000000000000000"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$RTC_VL_CLR(r0, 0x7014) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) r1 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) socket$netlink(0x10, 0x3, 0x9) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xe) keyctl$describe(0x6, r2, &(0x7f0000000100)=""/210, 0xd2) 00:46:51 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) dup3(r2, r1, 0x0) 00:46:51 executing program 5: getpid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff40000200bfa100000000000007010000f8ffffffb702000000000000bf130000000000008500000004000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r2, r1, 0x0, 0x19, &(0x7f0000000400)='+vmnet1GPLmd5sumkeyring.\x00'}, 0x30) 00:46:51 executing program 3: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0}, 0x200008c4) sendmsg$kcm(r0, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0x20000004) 00:46:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = getpgrp(0xffffffffffffffff) process_vm_readv(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:46:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086604, 0x20000001) 00:46:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x20004000000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xe8) 00:46:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x6, 0x7, 0x6}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000100), 0x0, 0xfffffffffffffffc}, 0x20) 00:46:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) [ 409.325677] audit: type=1326 audit(1543884412.013:10687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16187 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) listxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 00:46:52 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 00:46:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) setresuid(0x0, 0x0, 0x0) [ 409.356854] audit: type=1326 audit(1543884412.043:10688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16193 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 409.450592] audit: type=1326 audit(1543884412.133:10689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16206 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 409.472220] audit: type=1326 audit(1543884412.163:10690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16205 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:52 executing program 1: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20245e5e90096cd3689b2089acba2bc09834181e1e53ee5aa0c5b0635549ea2e9b4c315b483ea279460000000000000000000000000000"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$RTC_VL_CLR(r0, 0x7014) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) r1 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r1) socket$netlink(0x10, 0x3, 0x9) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xe) keyctl$describe(0x6, r2, &(0x7f0000000100)=""/210, 0xd2) 00:46:52 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5b9, 0x2) write$P9_RCREATE(r0, &(0x7f0000000040)={0x18}, 0x18) 00:46:52 executing program 3: socketpair(0x0, 0xe, 0x0, 0x0) 00:46:52 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @broadcast}, {0x6, @remote}, 0x8, {0x2, 0x0, @multicast2}, 'ip6gretap0\x00'}) [ 410.074434] audit: type=1326 audit(1543884412.763:10691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16193 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 410.131269] audit: type=1326 audit(1543884412.783:10692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16187 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0xd4, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xbe, 0x200007fd, &(0x7f0000000300)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x83, 0x5, 0x9, 0xe89, 0x9, {0x0, @in={{0x2, 0x4e24, @rand_addr=0x3}}, 0x3, 0x7b9, 0x1689}}, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r1, 0xba}, &(0x7f0000000380)=0x8) 00:46:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 00:46:52 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) [ 410.232401] audit: type=1326 audit(1543884412.923:10693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16206 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:52 executing program 1: 00:46:53 executing program 0: 00:46:53 executing program 4: 00:46:53 executing program 5: 00:46:53 executing program 1: 00:46:53 executing program 0: 00:46:53 executing program 3: 00:46:53 executing program 5: 00:46:53 executing program 4: 00:46:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0xd4, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xbe, 0x200007fd, &(0x7f0000000300)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x83, 0x5, 0x9, 0xe89, 0x9, {0x0, @in={{0x2, 0x4e24, @rand_addr=0x3}}, 0x3, 0x7b9, 0x1689}}, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r1, 0xba}, &(0x7f0000000380)=0x8) 00:46:53 executing program 1: 00:46:53 executing program 0: 00:46:53 executing program 4: 00:46:53 executing program 3: 00:46:53 executing program 5: 00:46:53 executing program 4: 00:46:53 executing program 3: 00:46:53 executing program 5: 00:46:53 executing program 1: 00:46:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000003bc0)=ANY=[@ANYBLOB='\x00'], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 00:46:54 executing program 5: 00:46:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0xd4, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xbe, 0x200007fd, &(0x7f0000000300)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x83, 0x5, 0x9, 0xe89, 0x9, {0x0, @in={{0x2, 0x4e24, @rand_addr=0x3}}, 0x3, 0x7b9, 0x1689}}, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r1, 0xba}, &(0x7f0000000380)=0x8) 00:46:54 executing program 3: 00:46:54 executing program 4: 00:46:54 executing program 1: 00:46:54 executing program 5: 00:46:54 executing program 0: 00:46:54 executing program 5: 00:46:54 executing program 4: 00:46:54 executing program 1: 00:46:54 executing program 3: 00:46:54 executing program 0: 00:46:55 executing program 5: r0 = socket$inet(0x10, 0x3, 0x2) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="24000000220007031dfffd946f610500", 0x10}], 0x1}, 0x0) 00:46:55 executing program 4: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000080)='./file0\x00'}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x2, 0x5, "c5c5153dd749aeb6db9b536ac6efb4882f7fddc443ce2d985cf79f48c21c3e0b6e7f8a06ed0cddfa3d4cc53b562eafc2a921de2bd1fb0e636971002b64bceb286364657595a20c224b9cfc7483989c0c"}, 0xd8) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)=0x0) exit(0x100000) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=r1, @ANYRESHEX=r1], &(0x7f0000000240)='./file0\x00', &(0x7f0000000440)='sysv\x00', 0x122bc00, &(0x7f0000000100)) write$binfmt_script(r0, &(0x7f0000000480)={'#! ', './file0', [{0x20, 'icmp6\x00'}, {0x20, '}'}], 0xa, "23bc1661abbf9be54770b6ac1f0e5c8adbcdf5976c39455835cdb05f3ddd5d80ce992ae78881a107d7ae4e517e2f605be349fe68ff1c1d2ac9120f97cd42f9fe9225a7e03865e6f32a99c40f1405a48eb53950bacce2a49efa2bcb12062967a9fb4f7c3e929216d0396fe4f1fc91fa3ad167e98b5526d16366c1277df3346a9b"}, 0x94) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="0180c200000000000000000081000000000c0000000000000000911aab5cc21f21b9cd4cec2e61e28c3a6f545298c266a9efbfae1d119af8d9164f7c46b0a19362163b562c1ae4d85affe82e2e34b2631c4d391833bb34039b61923cc0a63ccc61c46eac0e2e827b1378ba1a970a7eb945fdd0fbd36ed72c00000000000000000000"], 0x0) r2 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r2) socket$inet6(0xa, 0x5, 0x8) socket$netlink(0x10, 0x3, 0x9) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xe) keyctl$describe(0x6, r3, &(0x7f0000000100)=""/210, 0xd2) write$P9_RLERROR(0xffffffffffffffff, &(0x7f00000003c0)={0x15, 0x7, 0x2, {0xc, 'cifs.spnego\x00'}}, 0x15) 00:46:55 executing program 2: socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) 00:46:55 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) 00:46:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000380)) 00:46:55 executing program 5: fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) get_robust_list(r0, 0x0, 0x0) rename(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{&(0x7f0000003980)=@rc, 0x80, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, &(0x7f0000000080)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 00:46:55 executing program 0: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000080)='./file0\x00'}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000a40)={'icmp6\x00'}, &(0x7f0000000a80)=0x1e) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) restart_syscall() ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ffffffff1be2ff3f36e5d5accc366ec70593dffb724a8b0e951b20245e5e90096cd3689b2089acba2bc09834181e1e53ee5aa0c5b0635549ea2e9b4c315b483ea27946000000000000000000000000000000"]) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) io_setup(0x7, &(0x7f0000000280)) exit(0x100000) socketpair(0x2, 0x80007, 0x1, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$RTC_VL_CLR(r1, 0x7014) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000ac0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000b00)='TRUE', 0x4, 0x0) write$binfmt_script(r0, &(0x7f0000000480)={'#! ', './file0', [{0x20, 'icmp6\x00'}, {0x20, '}'}], 0xa, "23bc1661abbf9be54770b6ac1f0e5c8adbcdf5976c39455835cdb05f3ddd5d80ce992ae78881a107d7ae4e517e2f605be349fe68ff1c1d2ac9120f97cd42f9fe9225a7e03865e6f32a99c40f1405a48eb53950bacce2a49efa2bcb12062967a9fb4f7c3e929216d0396fe4f1fc91fa3ad167e98b5526d16366c1277df3346a9b"}, 0x94) syz_emit_ethernet(0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="0180c200000000000000000081000000000c0000000000000000911aab5cc21f21b9cd4cec2e61e28c3a6f545298c266a9efbfae1d119af8d9164f7c46b0a19362163b562c1ae4d85affe82e2e34b2631c4d391833bb34039b61923cc0a63ccc61c46eac0e2e827b1378ba1a970a7eb945fdd0fbd36ed72c00000000000000000000"], 0x0) r2 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='syz', 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r2) socket$netlink(0x10, 0x3, 0x9) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xe) keyctl$describe(0x6, r3, &(0x7f0000000100)=""/210, 0xd2) 00:46:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0xd4, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0xbe, 0x200007fd, &(0x7f0000000300)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 00:46:55 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x20000000000004) writev(r0, &(0x7f0000fb1000)=[{&(0x7f0000000280)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 00:46:55 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:46:56 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:46:56 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:46:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:46:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x0) 00:46:56 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:46:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') writev(r0, &(0x7f0000000080)=[{&(0x7f0000962000)='5', 0x1}], 0x1) 00:46:56 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x4b) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8044) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000440)=0x80040) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000001, 0x80000001, 0x10) accept4$inet(r2, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x800) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x2000000, 0x19c) mkdirat(r3, 0x0, 0x10) open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r4) setsockopt$inet6_tcp_int(r4, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000001c0)={'bcsf0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}}) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r5 = getpgrp(0xffffffffffffffff) ptrace$poke(0xffffffffffffffff, r5, &(0x7f0000000180), 0x0) recvfrom(r0, &(0x7f0000000480)=""/223, 0xdf, 0x2, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x7fff) 00:46:56 executing program 2: socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000240)) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x8) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) 00:46:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) setuid(0x0) 00:46:56 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 414.119419] kauditd_printk_skb: 1 callbacks suppressed [ 414.119434] audit: type=1326 audit(1543884416.803:10695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16397 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 414.120448] mmap: syz-executor1 (16400) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 414.158941] audit: type=1326 audit(1543884416.843:10696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16395 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:56 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) setrlimit(0x400000000000007, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x9, 0x0, r0}, 0x2c) 00:46:56 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:46:57 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:46:57 executing program 4: socket$unix(0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x13, &(0x7f0000000180), 0xff32) 00:46:57 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:46:57 executing program 3: set_mempolicy(0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') 00:46:57 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 414.908840] audit: type=1326 audit(1543884417.593:10697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16397 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 414.931920] audit: type=1326 audit(1543884417.623:10698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16395 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x4b) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8044) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000440)=0x80040) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000001, 0x80000001, 0x10) accept4$inet(r2, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x800) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x2000000, 0x19c) mkdirat(r3, 0x0, 0x10) open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r4) setsockopt$inet6_tcp_int(r4, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000001c0)={'bcsf0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}}) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r5 = getpgrp(0xffffffffffffffff) ptrace$poke(0xffffffffffffffff, r5, &(0x7f0000000180), 0x0) recvfrom(r0, &(0x7f0000000480)=""/223, 0xdf, 0x2, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x7fff) 00:46:57 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0a5c2d023c1262857180") r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) signalfd(0xffffffffffffffff, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1, 0x3, 0xffffffffffffff92}) ioctl$KVM_RUN(r3, 0xae80, 0x0) request_key(&(0x7f00000000c0)='logon\x00', 0x0, 0x0, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000280)={0x0, 0xff}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:46:57 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) dup3(r2, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 00:46:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffffff}]}) seccomp(0x1, 0x0, 0x0) 00:46:57 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 415.122333] audit: type=1326 audit(1543884417.803:10699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16465 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fadvise64(r0, 0x0, 0x0, 0x0) 00:46:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001180)="4e104205fc1be79a3fec5f21c516", 0xe}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bond_slave_0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x1000000000000014, &(0x7f0000000080)=0x6, 0x4) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000), 0x11d}}], 0x40000000000001d, 0x0) 00:46:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000006a80)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) [ 415.252373] audit: type=1326 audit(1543884417.943:10700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16476 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:58 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:46:58 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:46:58 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x800) ioctl$TIOCGSID(r0, 0x5429, 0x0) 00:46:58 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:46:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x4b) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8044) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000440)=0x80040) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000001, 0x80000001, 0x10) accept4$inet(r2, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x800) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x2000000, 0x19c) mkdirat(r3, 0x0, 0x10) open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r4) setsockopt$inet6_tcp_int(r4, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000001c0)={'bcsf0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}}) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r5 = getpgrp(0xffffffffffffffff) ptrace$poke(0xffffffffffffffff, r5, &(0x7f0000000180), 0x0) recvfrom(r0, &(0x7f0000000480)=""/223, 0xdf, 0x2, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x7fff) 00:46:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00'}, 0x0) 00:46:58 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 415.921314] audit: type=1326 audit(1543884418.603:10701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16465 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000000330000006031409200443a00fe800000000000000000000000000000ff0200000000000000000000000000010000907800000000fe8000000000000000000000000000007e07abcb041ff0bf38f7d782fea8704488b6d504fa42e55cb22ff7a036ee380cc8bc94c98f514373912f548630965d6cb422"], 0x1) 00:46:58 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x8d264d94b88cc547) [ 416.052379] audit: type=1326 audit(1543884418.743:10702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16476 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:46:58 executing program 3: 00:46:58 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 416.146619] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 416.269082] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:47:00 executing program 4: 00:47:00 executing program 2: 00:47:00 executing program 3: 00:47:00 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:47:00 executing program 0: 00:47:00 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x4b) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)=0x8044) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000440)=0x80040) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000001, 0x80000001, 0x10) accept4$inet(r2, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x800) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x2000000, 0x19c) mkdirat(r3, 0x0, 0x10) open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r4) setsockopt$inet6_tcp_int(r4, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000001c0)={'bcsf0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}}) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) r5 = getpgrp(0xffffffffffffffff) ptrace$poke(0xffffffffffffffff, r5, &(0x7f0000000180), 0x0) recvfrom(r0, &(0x7f0000000480)=""/223, 0xdf, 0x2, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x7fff) 00:47:00 executing program 3: 00:47:00 executing program 2: 00:47:00 executing program 0: 00:47:00 executing program 4: 00:47:00 executing program 3: 00:47:00 executing program 2: 00:47:00 executing program 0: 00:47:00 executing program 4: 00:47:00 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:47:00 executing program 3: 00:47:00 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:47:00 executing program 1: 00:47:00 executing program 4: 00:47:00 executing program 2: 00:47:00 executing program 0: 00:47:00 executing program 3: 00:47:00 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:47:01 executing program 3: 00:47:01 executing program 2: 00:47:01 executing program 0: 00:47:01 executing program 4: 00:47:01 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:47:01 executing program 1: 00:47:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) unshare(0x2000400) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r1, 0x406, r1) 00:47:01 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000640)="2400000002031f001cfffd946fa2830020200a000900020002e712000200a3a20404ff7e", 0x24}], 0x1}, 0x0) 00:47:01 executing program 3: syz_emit_ethernet(0x257, &(0x7f0000000140)={@link_local, @remote, [], {@ipv4={0x800, {{0xf, 0x4, 0x0, 0x0, 0x249, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @dev, {[@cipso={0x86, 0x10, 0xcc4, [{0x7, 0xa, "a553be5da4f1c515"}]}, @end, @timestamp={0x44, 0x14, 0x0, 0x0, 0x0, [{[], 0x1000}, {[@remote], 0x6}, {}]}]}}, @gre={{0x0, 0x0, 0x1, 0x103, 0x0, 0x7fffffff, 0x0, 0x1, 0x880b, 0x59, 0x0, [], "f3054c6b0fb1baf10f64e6591a305bb85006949ece5180abdfb6f4181b23dfbcf2f1e3cf6774fde8eb9ccc57d7b5dcd4b0f175211f26c33ca9ed62aacf6c66e4029254758596f19e0a31985af97625a8f364f02fa4b082fb3d"}, {0x1ff, 0x0, 0xfff, 0x1, 0x0, 0x0, 0x800, [], "12b73600ad272fdb6073b13366f2f72d25acaa6bfafe39fb637a35d8621de3516ddaec188cdb14dcbcc99fb263898a8078eac6777138e0be1a4c6831c634fbc478282a8618e3f67148a8f5a5e1b000328996872cb15e0468d188c1a9f567d4c0e43fcf7e975ab4e3d495197956689714b8feddef75c521e2c95a577c61243efca98490bd2bb3be7f6a140a1d5e6e6d800c8614185520e848ddef9b0aa8f04d884a"}, {0x20, 0x0, 0x2, 0x6, 0x0, 0x0, 0x86dd, [], "afccdc1bff13541bb92ad1eb3ae63aed8a9d34446984bb52491aae4be34f3ce2ed0adb7a902d5970f2925735c76b871b94b288784a801771bb5addaf23aa65766fdffed2ff29"}, {0x8, 0x88be, 0x4, {{0x3, 0x1, 0x6, 0xcd, 0xffffffffffff5a74, 0x8000, 0x19}, 0x1, 0x3}}, {0x8, 0x22eb, 0x3, {{0x9, 0x2, 0xcc, 0xa9b0, 0xffffffff, 0x80000000, 0x2, 0x7}, 0x2, 0xffffffff, 0x1, 0x40, 0x7fffffff, 0x9, 0x1, 0x9, 0x188b, 0x4}}, {0x8, 0x6558, 0x3, "b03063318f0ac8a2967a833e6535a9428acfbf05a549a1f81fc9f6f2deccf90b86e1a57821be3ab6ec85c745b0c5b08e2ea03ced49d6e6566b5c060d1a93f1a5f2ae9bb0348ad470afec963743ed63591199773bfbde748f027ddb0e048566fe82afd4ede4857487b7d4e35a32d163cabec3083edac12ebfe69271ce7b3428962d4ab5e4aeb2af3215"}}}}}}, 0x0) 00:47:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000080)=0xf0ba, 0x4) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000002c0)=0x2, 0x4fb) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 00:47:01 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) 00:47:01 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38}, [{}, {0x3}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:47:01 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) [ 418.652015] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 00:47:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x200000001, 0x7, 0x2000000000000009, 0x1}, 0x17) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000080), 0x0}, 0x18) 00:47:01 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000240), 0x8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 00:47:01 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xe29f) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000240)) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(r1, &(0x7f00000001c0)='Z', 0x1) 00:47:01 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(r1, &(0x7f00000001c0)='Z', 0x1) 00:47:01 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:47:01 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000300)=ANY=[@ANYBLOB="00155bef58e056d83740dbf62ee5f5199ee183e23af6ba3f445396ba2e0545a5c0f1a7e5e14ac9ad120c70f637737c49960414159f"]) 00:47:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = memfd_create(&(0x7f0000000280)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write$P9_RLERROR(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='X'], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)) 00:47:01 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:47:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 00:47:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r0, &(0x7f0000000080)) 00:47:01 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:47:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = memfd_create(&(0x7f0000000280)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) write$P9_RLERROR(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='X'], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)) [ 419.270292] audit: type=1326 audit(1543884421.953:10703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16675 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 00:47:02 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {}]}, 0x78) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 419.316675] audit: type=1326 audit(1543884422.003:10704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16681 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 419.389168] [ 419.390914] ==================================== [ 419.394711] kobject: 'rx-0' (00000000dd46db38): kobject_cleanup, parent 00000000aaafd789 [ 419.395810] WARNING: syz-executor5/16691 still has locks held! [ 419.410473] 4.20.0-rc5+ #141 Not tainted [ 419.413788] kobject: 'rx-0' (00000000dd46db38): auto cleanup 'remove' event [ 419.414706] ------------------------------------ [ 419.426553] 1 lock held by syz-executor5/16691: [ 419.431477] kobject: 'rx-0' (00000000dd46db38): kobject_uevent_env [ 419.438064] #0: 00000000beeb9fb8 (&sig->cred_guard_mutex){+.+.}, at: prepare_bprm_creds+0x53/0x120 [ 419.439293] kobject: 'rx-0' (00000000dd46db38): fill_kobj_path: path = '/devices/virtual/net/vet/queues/rx-0' [ 419.447524] [ 419.447524] stack backtrace: [ 419.460696] kobject: 'loop2' (0000000027f085a6): kobject_uevent_env [ 419.462642] CPU: 1 PID: 16691 Comm: syz-executor5 Not tainted 4.20.0-rc5+ #141 [ 419.468617] kobject: 'loop2' (0000000027f085a6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 419.475938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.475944] Call Trace: [ 419.476034] dump_stack+0x244/0x39d [ 419.476055] ? dump_stack_print_info.cold.1+0x20/0x20 [ 419.488470] kobject: 'rx-0' (00000000dd46db38): auto cleanup kobject_del [ 419.494986] ? vprintk_func+0x85/0x181 [ 419.495019] debug_check_no_locks_held.cold.49+0x93/0x9f [ 419.495039] flush_old_exec+0x1ea2/0x2480 [ 419.498008] kobject: 'rx-0' (00000000dd46db38): calling ktype release [ 419.501287] ? save_stack+0x43/0xd0 [ 419.501303] ? __kmalloc+0x15b/0x760 [ 419.501322] ? copy_strings_kernel+0x110/0x110 [ 419.501385] ? iov_iter_init+0xe5/0x210 [ 419.501444] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 419.507404] kobject: 'rx-0': free name [ 419.513444] ? __vfs_read+0x11f/0x9b0 [ 419.513462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.513499] ? fsnotify+0x50e/0xef0 [ 419.513532] ? fsnotify+0xef0/0xef0 [ 419.518143] kobject: 'tx-0' (0000000048e47551): kobject_cleanup, parent 00000000aaafd789 [ 419.522875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.522891] ? fsnotify_first_mark+0x350/0x350 [ 419.522904] ? __fsnotify_parent+0xcc/0x430 [ 419.522917] ? fsnotify+0xef0/0xef0 [ 419.522934] ? rw_verify_area+0x118/0x360 [ 419.522949] ? vfs_read+0x1ce/0x3c0 [ 419.522983] ? kernel_read+0xab/0x120 [ 419.527589] kobject: 'tx-0' (0000000048e47551): auto cleanup 'remove' event [ 419.533695] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 419.533768] ? load_elf_phdrs+0x1e4/0x270 [ 419.533785] ? writenote+0x3d0/0x3d0 [ 419.537830] kobject: 'tx-0' (0000000048e47551): kobject_uevent_env [ 419.541123] ? __kasan_slab_free+0x119/0x150 [ 419.541144] load_elf_binary+0xa9a/0x5cf0 [ 419.541161] ? find_held_lock+0x36/0x1c0 [ 419.541187] ? notesize.isra.6+0x80/0x80 [ 419.541229] ? ima_file_mmap+0x160/0x160 [ 419.541248] ? lock_downgrade+0x900/0x900 [ 419.546301] kobject: 'tx-0' (0000000048e47551): fill_kobj_path: path = '/devices/virtual/net/vet/queues/tx-0' [ 419.549787] ? kasan_check_write+0x14/0x20 [ 419.549806] search_binary_handler+0x17d/0x570 [ 419.549826] __do_execve_file.isra.33+0x1661/0x25d0 [ 419.549846] ? prepare_bprm_creds+0x120/0x120 [ 419.555945] kobject: 'tx-0' (0000000048e47551): auto cleanup kobject_del [ 419.559275] ? usercopy_warn+0x110/0x110 [ 419.559328] ? check_preemption_disabled+0x48/0x280 [ 419.563655] kobject: 'tx-0' (0000000048e47551): calling ktype release [ 419.568679] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 419.568700] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 419.572721] kobject: 'tx-0': free name [ 419.575990] ? strncpy_from_user+0x411/0x5a0 [ 419.576025] ? digsig_verify+0x1530/0x1530 00:47:02 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000240), 0x8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 00:47:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 00:47:02 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{0x3}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:47:02 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{0x3}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 419.584767] kobject: 'queues' (00000000aaafd789): kobject_cleanup, parent (null) [ 419.589760] ? kmem_cache_alloc+0x33a/0x730 [ 419.589779] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 419.589798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.589819] __x64_sys_execveat+0xed/0x130 [ 419.594798] kobject: 'queues' (00000000aaafd789): calling ktype release [ 419.598733] do_syscall_64+0x1b9/0x820 [ 419.598793] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 419.602848] kobject: 'queues' (00000000aaafd789): kset_release 00:47:02 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{0x3}]}, 0x58) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 419.606510] ? syscall_return_slowpath+0x5e0/0x5e0 [ 419.606526] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.606557] ? trace_hardirqs_on_caller+0x310/0x310 [ 419.606577] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 419.610327] kobject: 'queues': free name [ 419.614009] ? prepare_exit_to_usermode+0x291/0x3b0 [ 419.614026] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.614043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.614053] RIP: 0033:0x457569 [ 419.614068] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 419.614081] RSP: 002b:00007f82305a5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 419.622225] kobject: 'vet' (00000000b9b271d0): kobject_uevent_env [ 419.626174] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 419.626183] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 419.626192] RBP: 000000000072bf00 R08: 0000000000001000 R09: 0000000000000000 00:47:02 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 419.626201] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f82305a66d4 [ 419.626210] R13: 00000000004bdc9b R14: 00000000004cd1d8 R15: 00000000ffffffff [ 419.653014] kobject: 'loop5' (00000000e5404499): kobject_uevent_env [ 419.656989] kobject: 'vet' (00000000b9b271d0): fill_kobj_path: path = '/devices/virtual/net/vet' [ 419.657173] kobject: 'loop5' (00000000e5404499): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 419.758691] audit: type=1326 audit(1543884422.443:10705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16695 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 419.843685] cgroup: fork rejected by pids controller in /syz5 [ 419.859963] audit: type=1326 audit(1543884422.543:10706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16695 comm="syz-executor2" exe="/root/syz-executor2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0x0 [ 419.907713] kobject: 'loop3' (000000009520f953): kobject_uevent_env [ 419.992909] kobject: 'vet' (00000000b9b271d0): kobject_cleanup, parent (null) [ 420.010265] kobject: 'vet' (00000000b9b271d0): calling ktype release [ 420.022225] kobject: 'loop3' (000000009520f953): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 420.028992] kobject: 'vet': free name 00:47:02 executing program 0: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000080)=""/165) [ 420.061458] audit: type=1326 audit(1543884422.743:10707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16675 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 420.099087] kobject: 'loop0' (00000000f3025fcc): kobject_uevent_env 00:47:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) waitid(0x0, 0x0, 0x0, 0x0, 0x0) 00:47:02 executing program 4: r0 = open(&(0x7f0000000680)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) r1 = eventfd(0x0) read(r1, &(0x7f00000006c0)=""/4096, 0x1000) open(&(0x7f00000000c0)='./file0\x00', 0x105001, 0x0) write(r1, &(0x7f0000000140)="4d44e1797a36b47d", 0x8) [ 420.111291] audit: type=1326 audit(1543884422.793:10708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16681 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 420.111918] kobject: 'loop0' (00000000f3025fcc): fill_kobj_path: path = '/devices/virtual/block/loop0' 00:47:02 executing program 0: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000080)=""/165) [ 420.206400] audit: type=1326 audit(1543884422.893:10709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16721 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 420.211717] kobject: 'loop1' (0000000012192267): kobject_uevent_env [ 420.258997] kobject: 'loop1' (0000000012192267): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 420.270662] kobject: 'loop4' (00000000f17fdb83): kobject_uevent_env [ 420.277769] kobject: 'loop4' (00000000f17fdb83): fill_kobj_path: path = '/devices/virtual/block/loop4' 00:47:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) [ 420.313174] kobject: 'loop0' (00000000f3025fcc): kobject_uevent_env [ 420.319668] kobject: 'loop0' (00000000f3025fcc): fill_kobj_path: path = '/devices/virtual/block/loop0' 00:47:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffffffffffa}]}) setregid(0x0, 0x0) [ 420.353986] audit: type=1326 audit(1543884423.033:10710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16732 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 420.366994] kobject: 'loop3' (000000009520f953): kobject_uevent_env [ 420.386479] kobject: 'loop3' (000000009520f953): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 420.405631] audit: type=1326 audit(1543884423.093:10711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16736 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 420.537688] audit: type=1326 audit(1543884423.223:10712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=16695 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3ca code=0xffff0000 [ 420.567526] kobject: 'rx-0' (00000000717f4f2a): kobject_cleanup, parent 00000000c10a7bf2 [ 420.575992] kobject: 'rx-0' (00000000717f4f2a): auto cleanup 'remove' event 00:47:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) [ 420.591185] kobject: 'rx-0' (00000000717f4f2a): kobject_uevent_env [ 420.598119] kobject: 'rx-0' (00000000717f4f2a): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 420.609295] kobject: 'rx-0' (00000000717f4f2a): auto cleanup kobject_del [ 420.611839] kobject: 'loop2' (0000000027f085a6): kobject_uevent_env [ 420.616741] kobject: 'rx-0' (00000000717f4f2a): calling ktype release [ 420.629602] kobject: 'rx-0': free name [ 420.630723] kobject: 'loop2' (0000000027f085a6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 420.634029] kobject: 'tx-0' (00000000534a4247): kobject_cleanup, parent 00000000c10a7bf2 [ 420.651805] kobject: 'tx-0' (00000000534a4247): auto cleanup 'remove' event [ 420.659252] kobject: 'tx-0' (00000000534a4247): kobject_uevent_env [ 420.666161] kobject: 'tx-0' (00000000534a4247): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 420.676918] kobject: 'tx-0' (00000000534a4247): auto cleanup kobject_del [ 420.684021] kobject: 'tx-0' (00000000534a4247): calling ktype release [ 420.690681] kobject: 'tx-0': free name [ 420.694905] kobject: 'queues' (00000000c10a7bf2): kobject_cleanup, parent (null) [ 420.703528] kobject: 'queues' (00000000c10a7bf2): calling ktype release [ 420.710334] kobject: 'queues' (00000000c10a7bf2): kset_release [ 420.716423] kobject: 'queues': free name [ 420.720795] kobject: 'syz_tun' (00000000c0afc20a): kobject_uevent_env [ 420.727485] kobject: 'syz_tun' (00000000c0afc20a): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 420.738273] kobject: 'rx-0' (000000008099bff5): kobject_cleanup, parent 0000000000413c76 [ 420.746560] kobject: 'rx-0' (000000008099bff5): auto cleanup 'remove' event [ 420.753792] kobject: 'rx-0' (000000008099bff5): kobject_uevent_env [ 420.760144] kobject: 'rx-0' (000000008099bff5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.770226] kobject: 'rx-0' (000000008099bff5): auto cleanup kobject_del [ 420.777298] kobject: 'rx-0' (000000008099bff5): calling ktype release [ 420.783916] kobject: 'rx-0': free name [ 420.787844] kobject: 'tx-0' (0000000080696dda): kobject_cleanup, parent 0000000000413c76 [ 420.796157] kobject: 'tx-0' (0000000080696dda): auto cleanup 'remove' event [ 420.803290] kobject: 'tx-0' (0000000080696dda): kobject_uevent_env [ 420.809614] kobject: 'tx-0' (0000000080696dda): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.819733] kobject: 'tx-0' (0000000080696dda): auto cleanup kobject_del [ 420.826631] kobject: 'tx-0' (0000000080696dda): calling ktype release [ 420.833265] kobject: 'tx-0': free name [ 420.837170] kobject: 'queues' (0000000000413c76): kobject_cleanup, parent (null) [ 420.845603] kobject: 'queues' (0000000000413c76): calling ktype release [ 420.852761] kobject: 'queues' (0000000000413c76): kset_release [ 420.858724] kobject: 'queues': free name [ 420.863175] kobject: 'ip6gre0' (0000000071e48c4b): kobject_uevent_env [ 420.869758] kobject: 'ip6gre0' (0000000071e48c4b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.880796] kobject: 'rx-0' (000000003ef6687c): kobject_cleanup, parent 00000000c046d9fd [ 420.889088] kobject: 'rx-0' (000000003ef6687c): auto cleanup 'remove' event [ 420.896265] kobject: 'rx-0' (000000003ef6687c): kobject_uevent_env [ 420.902618] kobject: 'rx-0' (000000003ef6687c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.912748] kobject: 'rx-0' (000000003ef6687c): auto cleanup kobject_del [ 420.919603] kobject: 'rx-0' (000000003ef6687c): calling ktype release [ 420.926233] kobject: 'rx-0': free name [ 420.930188] kobject: 'tx-0' (00000000238f1cb4): kobject_cleanup, parent 00000000c046d9fd [ 420.938648] kobject: 'tx-0' (00000000238f1cb4): auto cleanup 'remove' event [ 420.945793] kobject: 'tx-0' (00000000238f1cb4): kobject_uevent_env [ 420.952183] kobject: 'tx-0' (00000000238f1cb4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 420.962257] kobject: 'tx-0' (00000000238f1cb4): auto cleanup kobject_del [ 420.969149] kobject: 'tx-0' (00000000238f1cb4): calling ktype release [ 420.975975] kobject: 'tx-0': free name [ 420.979888] kobject: 'queues' (00000000c046d9fd): kobject_cleanup, parent (null) [ 420.988343] kobject: 'queues' (00000000c046d9fd): calling ktype release [ 420.995164] kobject: 'queues' (00000000c046d9fd): kset_release [ 421.001169] kobject: 'queues': free name [ 421.005625] kobject: 'ip6gre0' (000000006b74dd34): kobject_uevent_env [ 421.012246] kobject: 'ip6gre0' (000000006b74dd34): kobject_uevent_env: uevent_suppress caused the event to drop! [ 421.022712] kobject: 'syz_tun' (00000000c0afc20a): kobject_cleanup, parent (null) [ 421.031278] kobject: 'syz_tun' (00000000c0afc20a): calling ktype release [ 421.038198] kobject: 'syz_tun': free name 00:47:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) [ 421.042539] kobject: 'ip6gre0' (0000000071e48c4b): kobject_cleanup, parent (null) [ 421.051378] kobject: 'ip6gre0' (0000000071e48c4b): auto cleanup 'remove' event [ 421.070938] kobject: 'ip6gre0' (0000000071e48c4b): kobject_uevent_env [ 421.078562] kobject: 'loop1' (0000000012192267): kobject_uevent_env 00:47:03 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)="3a2f766d6e657430706f7369785f61636c5f6163636573797374e2d977c3d86584eee9656d2500", 0x1) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{}, {0x3}]}, 0x78) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 421.085413] kobject: 'loop1' (0000000012192267): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 421.095136] kobject: 'ip6gre0' (0000000071e48c4b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 421.128606] kobject: 'ip6gre0' (0000000071e48c4b): calling ktype release [ 421.136653] kobject: 'ip6gre0': free name 00:47:03 executing program 4: r0 = open(&(0x7f0000000680)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) r1 = eventfd(0x0) read(r1, &(0x7f00000006c0)=""/4096, 0x1000) open(&(0x7f00000000c0)='./file0\x00', 0x105001, 0x0) write(r1, &(0x7f0000000140)="4d44e1797a36b47d", 0x8) [ 421.144411] kobject: 'loop4' (00000000f17fdb83): kobject_uevent_env [ 421.147613] kobject: 'ip6gre0' (000000006b74dd34): kobject_cleanup, parent (null) [ 421.152137] kobject: 'loop4' (00000000f17fdb83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 421.174788] kobject: 'ip6gre0' (000000006b74dd34): auto cleanup 'remove' event [ 421.187957] kobject: 'ip6gre0' (000000006b74dd34): kobject_uevent_env 00:47:03 executing program 0: r0 = open(&(0x7f0000000680)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) r1 = eventfd(0x0) read(r1, &(0x7f00000006c0)=""/4096, 0x1000) open(&(0x7f00000000c0)='./file0\x00', 0x105001, 0x0) write(r1, &(0x7f0000000140)="4d44e1797a36b47d", 0x8) [ 421.201160] kobject: 'ip6gre0' (000000006b74dd34): kobject_uevent_env: uevent_suppress caused the event to drop! [ 421.225611] kobject: 'ip6gre0' (000000006b74dd34): calling ktype release [ 421.232922] kobject: 'ip6gre0': free name [ 421.237454] kobject: 'loop0' (00000000f3025fcc): kobject_uevent_env 00:47:03 executing program 3: r0 = open(&(0x7f0000000680)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) r1 = eventfd(0x0) read(r1, &(0x7f00000006c0)=""/4096, 0x1000) open(&(0x7f00000000c0)='./file0\x00', 0x105001, 0x0) write(r1, &(0x7f0000000140)="4d44e1797a36b47d", 0x8) [ 421.244186] kobject: 'loop0' (00000000f3025fcc): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 421.252953] IPVS: ftp: loaded support on port[0] = 21 [ 421.260779] kobject: 'rx-0' (00000000c1ef5a5e): kobject_cleanup, parent 0000000013d9ebe2 [ 421.273811] kobject: 'rx-0' (00000000c1ef5a5e): auto cleanup 'remove' event [ 421.288274] kobject: 'rx-0' (00000000c1ef5a5e): kobject_uevent_env [ 421.294881] kobject: 'rx-0' (00000000c1ef5a5e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 421.305447] kobject: 'loop3' (000000009520f953): kobject_uevent_env [ 421.312730] kobject: 'loop3' (000000009520f953): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 421.322664] kobject: 'rx-0' (00000000c1ef5a5e): auto cleanup kobject_del [ 421.338201] kobject: 'rx-0' (00000000c1ef5a5e): calling ktype release [ 421.345185] kobject: 'rx-0': free name [ 421.349245] kobject: 'tx-0' (0000000070c4fbd9): kobject_cleanup, parent 0000000013d9ebe2 [ 421.357977] kobject: 'tx-0' (0000000070c4fbd9): auto cleanup 'remove' event [ 421.365178] kobject: 'tx-0' (0000000070c4fbd9): kobject_uevent_env [ 421.371713] kobject: 'tx-0' (0000000070c4fbd9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 421.381803] kobject: 'tx-0' (0000000070c4fbd9): auto cleanup kobject_del [ 421.388705] kobject: 'tx-0' (0000000070c4fbd9): calling ktype release [ 421.395344] kobject: 'tx-0': free name [ 421.399239] kobject: 'queues' (0000000013d9ebe2): kobject_cleanup, parent (null) [ 421.408104] kobject: 'queues' (0000000013d9ebe2): calling ktype release [ 421.414929] kobject: 'queues' (0000000013d9ebe2): kset_release [ 421.420897] kobject: 'queues': free name [ 421.425328] kobject: 'ip6tnl0' (0000000006dfab18): kobject_uevent_env [ 421.431945] kobject: 'ip6tnl0' (0000000006dfab18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 421.442958] kobject: 'rx-0' (00000000f25a5aad): kobject_cleanup, parent 000000007ee48a7c 00:47:04 executing program 2: r0 = open(&(0x7f0000000680)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) r1 = eventfd(0x0) read(r1, &(0x7f00000006c0)=""/4096, 0x1000) open(&(0x7f00000000c0)='./file0\x00', 0x105001, 0x0) write(r1, &(0x7f0000000140)="4d44e1797a36b47d", 0x8) [ 421.451235] kobject: 'rx-0' (00000000f25a5aad): auto cleanup 'remove' event [ 421.458340] kobject: 'rx-0' (00000000f25a5aad): kobject_uevent_env [ 421.464807] kobject: 'rx-0' (00000000f25a5aad): kobject_uevent_env: uevent_suppress caused the event to drop! [ 421.475326] kobject: 'loop2' (0000000027f085a6): kobject_uevent_env [ 421.482022] kobject: 'loop2' (0000000027f085a6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 421.491597] kobject: 'rx-0' (00000000f25a5aad): auto cleanup kobject_del [ 421.498477] kobject: 'rx-0' (00000000f25a5aad): calling ktype release [ 421.509364] kobject: 'rx-0': free name [ 421.513526] kobject: 'tx-0' (0000000074e24e8a): kobject_cleanup, parent 000000007ee48a7c [ 421.523731] kobject: 'tx-0' (0000000074e24e8a): auto cleanup 'remove' event [ 421.530837] kobject: 'tx-0' (0000000074e24e8a): kobject_uevent_env [ 421.537561] kobject: 'tx-0' (0000000074e24e8a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 421.547666] kobject: 'tx-0' (0000000074e24e8a): auto cleanup kobject_del [ 421.554990] kobject: 'tx-0' (0000000074e24e8a): calling ktype release [ 421.561695] kobject: 'tx-0': free name [ 421.565627] kobject: 'queues' (000000007ee48a7c): kobject_cleanup, parent (null) [ 421.574079] kobject: 'queues' (000000007ee48a7c): calling ktype release [ 421.580843] kobject: 'queues' (000000007ee48a7c): kset_release [ 421.587052] kobject: 'queues': free name [ 421.591465] kobject: 'ip6tnl0' (0000000068a70dea): kobject_uevent_env [ 421.598032] kobject: 'ip6tnl0' (0000000068a70dea): kobject_uevent_env: uevent_suppress caused the event to drop! [ 421.608770] kobject: 'lo' (00000000584e61d0): kobject_add_internal: parent: 'net', set: 'devices' [ 421.618322] kobject: 'lo' (00000000584e61d0): kobject_uevent_env [ 421.624536] kobject: 'lo' (00000000584e61d0): fill_kobj_path: path = '/devices/virtual/net/lo' [ 421.633445] kobject: 'queues' (0000000091de8082): kobject_add_internal: parent: 'lo', set: '' [ 421.642711] kobject: 'queues' (0000000091de8082): kobject_uevent_env [ 421.649205] kobject: 'queues' (0000000091de8082): kobject_uevent_env: filter function caused the event to drop! [ 421.659480] kobject: 'rx-0' (0000000075fe2890): kobject_add_internal: parent: 'queues', set: 'queues' [ 421.669227] kobject: 'rx-0' (0000000075fe2890): kobject_uevent_env [ 421.675605] kobject: 'rx-0' (0000000075fe2890): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 421.685753] kobject: 'tx-0' (00000000dc82a3a7): kobject_add_internal: parent: 'queues', set: 'queues' [ 421.695329] kobject: 'tx-0' (00000000dc82a3a7): kobject_uevent_env [ 421.701684] kobject: 'tx-0' (00000000dc82a3a7): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 421.712510] kobject: 'tunl0' (000000000c8ee658): kobject_add_internal: parent: 'net', set: 'devices' [ 421.722697] kobject: 'tunl0' (000000000c8ee658): kobject_uevent_env [ 421.729138] kobject: 'tunl0' (000000000c8ee658): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 421.738542] kobject: 'queues' (00000000005c334d): kobject_add_internal: parent: 'tunl0', set: '' [ 421.748321] kobject: 'queues' (00000000005c334d): kobject_uevent_env [ 421.754871] kobject: 'queues' (00000000005c334d): kobject_uevent_env: filter function caused the event to drop! [ 421.765147] kobject: 'rx-0' (00000000e789a908): kobject_add_internal: parent: 'queues', set: 'queues' [ 421.774605] kobject: 'rx-0' (00000000e789a908): kobject_uevent_env [ 421.780943] kobject: 'rx-0' (00000000e789a908): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 421.791579] kobject: 'tx-0' (00000000fd4b5fd3): kobject_add_internal: parent: 'queues', set: 'queues' [ 421.801133] kobject: 'tx-0' (00000000fd4b5fd3): kobject_uevent_env [ 421.807495] kobject: 'tx-0' (00000000fd4b5fd3): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 421.818481] kobject: 'gre0' (00000000041c0517): kobject_add_internal: parent: 'net', set: 'devices' [ 421.821127] kobject: 'ip6tnl0' (0000000006dfab18): kobject_cleanup, parent (null) [ 421.828552] kobject: 'gre0' (00000000041c0517): kobject_uevent_env [ 421.836864] kobject: 'ip6tnl0' (0000000006dfab18): auto cleanup 'remove' event [ 421.842662] kobject: 'gre0' (00000000041c0517): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 421.842747] kobject: 'queues' (00000000f9374a3a): kobject_add_internal: parent: 'gre0', set: '' [ 421.850420] kobject: 'ip6tnl0' (0000000006dfab18): kobject_uevent_env [ 421.859193] kobject: 'queues' (00000000f9374a3a): kobject_uevent_env [ 421.859203] kobject: 'queues' (00000000f9374a3a): kobject_uevent_env: filter function caused the event to drop! [ 421.859228] kobject: 'rx-0' (0000000013458885): kobject_add_internal: parent: 'queues', set: 'queues' 00:47:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) [ 421.859286] kobject: 'rx-0' (0000000013458885): kobject_uevent_env [ 421.869070] kobject: 'ip6tnl0' (0000000006dfab18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 421.875358] kobject: 'rx-0' (0000000013458885): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 421.882202] kobject: 'ip6tnl0' (0000000006dfab18): calling ktype release [ 421.892233] kobject: 'tx-0' (0000000018776b71): kobject_add_internal: parent: 'queues', set: 'queues' [ 421.901965] kobject: 'ip6tnl0': free name [ 421.908125] kobject: 'tx-0' (0000000018776b71): kobject_uevent_env [ 421.942888] kobject: 'loop1' (0000000012192267): kobject_uevent_env [ 421.962042] kobject: 'loop1' (0000000012192267): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 421.962310] kobject: 'tx-0' (0000000018776b71): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 421.982742] kobject: 'ip6tnl0' (0000000068a70dea): kobject_cleanup, parent (null) [ 421.982883] kobject: 'gretap0' (00000000860311dc): kobject_add_internal: parent: 'net', set: 'devices' [ 421.996424] kobject: 'ip6tnl0' (0000000068a70dea): auto cleanup 'remove' event [ 422.001892] kobject: 'gretap0' (00000000860311dc): kobject_uevent_env [ 422.016341] kobject: 'gretap0' (00000000860311dc): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 422.026101] kobject: 'queues' (00000000742c7307): kobject_add_internal: parent: 'gretap0', set: '' [ 422.028898] kobject: 'ip6tnl0' (0000000068a70dea): kobject_uevent_env [ 422.042613] kobject: 'queues' (00000000742c7307): kobject_uevent_env 00:47:04 executing program 4: r0 = open(&(0x7f0000000680)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) r1 = eventfd(0x0) read(r1, &(0x7f00000006c0)=""/4096, 0x1000) open(&(0x7f00000000c0)='./file0\x00', 0x105001, 0x0) write(r1, &(0x7f0000000140)="4d44e1797a36b47d", 0x8) 00:47:04 executing program 0: r0 = open(&(0x7f0000000680)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) r1 = eventfd(0x0) read(r1, &(0x7f00000006c0)=""/4096, 0x1000) open(&(0x7f00000000c0)='./file0\x00', 0x105001, 0x0) write(r1, &(0x7f0000000140)="4d44e1797a36b47d", 0x8) [ 422.045832] kobject: 'loop4' (00000000f17fdb83): kobject_uevent_env [ 422.049128] kobject: 'queues' (00000000742c7307): kobject_uevent_env: filter function caused the event to drop! [ 422.066210] kobject: 'rx-0' (000000006d7bdcde): kobject_add_internal: parent: 'queues', set: 'queues' [ 422.076472] kobject: 'loop4' (00000000f17fdb83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 422.081567] kobject: 'ip6tnl0' (0000000068a70dea): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.096408] kobject: 'rx-0' (000000006d7bdcde): kobject_uevent_env 00:47:04 executing program 3: r0 = open(&(0x7f0000000680)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) r1 = eventfd(0x0) read(r1, &(0x7f00000006c0)=""/4096, 0x1000) open(&(0x7f00000000c0)='./file0\x00', 0x105001, 0x0) write(r1, &(0x7f0000000140)="4d44e1797a36b47d", 0x8) [ 422.106076] kobject: 'loop0' (00000000f3025fcc): kobject_uevent_env [ 422.108258] kobject: 'rx-0' (000000006d7bdcde): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 422.129453] kobject: 'ip6tnl0' (0000000068a70dea): calling ktype release [ 422.141183] kobject: 'loop0' (00000000f3025fcc): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 422.141298] kobject: 'ip6tnl0': free name [ 422.155863] kobject: 'tx-0' (00000000392f4b61): kobject_add_internal: parent: 'queues', set: 'queues' [ 422.167168] kobject: 'tx-0' (00000000392f4b61): kobject_uevent_env [ 422.174790] kobject: 'loop3' (000000009520f953): kobject_uevent_env [ 422.179132] kobject: 'tx-0' (00000000392f4b61): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 422.190219] kobject: 'loop3' (000000009520f953): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 422.202230] kobject: 'rx-0' (000000002f97d85d): kobject_cleanup, parent 00000000c6bbeaf6 [ 422.210522] kobject: 'rx-0' (000000002f97d85d): auto cleanup 'remove' event [ 422.218092] kobject: 'rx-0' (000000002f97d85d): kobject_uevent_env [ 422.224737] kobject: 'rx-0' (000000002f97d85d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.235173] kobject: 'rx-0' (000000002f97d85d): auto cleanup kobject_del [ 422.242062] kobject: 'rx-0' (000000002f97d85d): calling ktype release [ 422.248663] kobject: 'rx-0': free name [ 422.252676] kobject: 'tx-0' (00000000df189635): kobject_cleanup, parent 00000000c6bbeaf6 [ 422.261035] kobject: 'tx-0' (00000000df189635): auto cleanup 'remove' event [ 422.268190] kobject: 'tx-0' (00000000df189635): kobject_uevent_env [ 422.274576] kobject: 'tx-0' (00000000df189635): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.284688] kobject: 'tx-0' (00000000df189635): auto cleanup kobject_del [ 422.291575] kobject: 'tx-0' (00000000df189635): calling ktype release [ 422.298216] kobject: 'tx-0': free name 00:47:05 executing program 2: r0 = open(&(0x7f0000000680)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) r1 = eventfd(0x0) read(r1, &(0x7f00000006c0)=""/4096, 0x1000) open(&(0x7f00000000c0)='./file0\x00', 0x105001, 0x0) write(r1, &(0x7f0000000140)="4d44e1797a36b47d", 0x8) [ 422.302235] kobject: 'queues' (00000000c6bbeaf6): kobject_cleanup, parent (null) [ 422.310836] kobject: 'queues' (00000000c6bbeaf6): calling ktype release [ 422.317642] kobject: 'queues' (00000000c6bbeaf6): kset_release [ 422.322326] kobject: 'loop2' (0000000027f085a6): kobject_uevent_env [ 422.324434] kobject: 'queues': free name [ 422.330127] kobject: 'loop2' (0000000027f085a6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 422.334530] kobject: 'sit0' (000000008178ac0b): kobject_uevent_env [ 422.350400] kobject: 'sit0' (000000008178ac0b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.373739] kobject: 'rx-0' (000000009082a475): kobject_cleanup, parent 000000004f87dad4 [ 422.383365] kobject: 'rx-0' (000000009082a475): auto cleanup 'remove' event [ 422.390459] kobject: 'rx-0' (000000009082a475): kobject_uevent_env [ 422.396832] kobject: 'rx-0' (000000009082a475): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.406907] kobject: 'rx-0' (000000009082a475): auto cleanup kobject_del [ 422.413788] kobject: 'rx-0' (000000009082a475): calling ktype release [ 422.420363] kobject: 'rx-0': free name [ 422.424340] kobject: 'tx-0' (00000000092b9de5): kobject_cleanup, parent 000000004f87dad4 [ 422.432594] kobject: 'tx-0' (00000000092b9de5): auto cleanup 'remove' event [ 422.439686] kobject: 'tx-0' (00000000092b9de5): kobject_uevent_env [ 422.446030] kobject: 'tx-0' (00000000092b9de5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.456118] kobject: 'tx-0' (00000000092b9de5): auto cleanup kobject_del [ 422.463753] kobject: 'tx-0' (00000000092b9de5): calling ktype release [ 422.470330] kobject: 'tx-0': free name [ 422.474668] kobject: 'queues' (000000004f87dad4): kobject_cleanup, parent (null) [ 422.483754] kobject: 'queues' (000000004f87dad4): calling ktype release [ 422.490499] kobject: 'queues' (000000004f87dad4): kset_release [ 422.496493] kobject: 'queues': free name [ 422.500785] kobject: 'sit0' (00000000259c31c9): kobject_uevent_env [ 422.507144] kobject: 'sit0' (00000000259c31c9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 422.517523] kobject: 'erspan0' (0000000067f7ebae): kobject_add_internal: parent: 'net', set: 'devices' [ 422.527694] kobject: 'erspan0' (0000000067f7ebae): kobject_uevent_env [ 422.534350] kobject: 'erspan0' (0000000067f7ebae): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 422.544053] kobject: 'queues' (00000000e42ae96a): kobject_add_internal: parent: 'erspan0', set: '' [ 422.553815] kobject: 'queues' (00000000e42ae96a): kobject_uevent_env [ 422.560319] kobject: 'queues' (00000000e42ae96a): kobject_uevent_env: filter function caused the event to drop! [ 422.570703] kobject: 'rx-0' (00000000c8d86796): kobject_add_internal: parent: 'queues', set: 'queues' [ 422.580235] kobject: 'rx-0' (00000000c8d86796): kobject_uevent_env [ 422.586618] kobject: 'rx-0' (00000000c8d86796): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 422.597152] kobject: 'tx-0' (000000007d123d22): kobject_add_internal: parent: 'queues', set: 'queues' [ 422.607051] kobject: 'tx-0' (000000007d123d22): kobject_uevent_env [ 422.613989] kobject: 'tx-0' (000000007d123d22): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 422.626123] kobject: 'ip_vti0' (00000000a3db4fca): kobject_add_internal: parent: 'net', set: 'devices' [ 422.636472] kobject: 'ip_vti0' (00000000a3db4fca): kobject_uevent_env [ 422.643131] kobject: 'ip_vti0' (00000000a3db4fca): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 422.652873] kobject: 'queues' (00000000db1a7c6c): kobject_add_internal: parent: 'ip_vti0', set: '' [ 422.662549] kobject: 'queues' (00000000db1a7c6c): kobject_uevent_env [ 422.669046] kobject: 'queues' (00000000db1a7c6c): kobject_uevent_env: filter function caused the event to drop! [ 422.679379] kobject: 'rx-0' (000000006448574f): kobject_add_internal: parent: 'queues', set: 'queues' [ 422.688865] kobject: 'rx-0' (000000006448574f): kobject_uevent_env [ 422.695247] kobject: 'rx-0' (000000006448574f): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 422.705804] kobject: 'tx-0' (000000008945973e): kobject_add_internal: parent: 'queues', set: 'queues' [ 422.715487] kobject: 'tx-0' (000000008945973e): kobject_uevent_env [ 422.721881] kobject: 'tx-0' (000000008945973e): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 422.733042] kobject: 'sit0' (000000008178ac0b): kobject_cleanup, parent (null) [ 422.733243] kobject: 'ip6_vti0' (0000000061249934): kobject_add_internal: parent: 'net', set: 'devices' [ 422.741901] kobject: 'sit0' (000000008178ac0b): auto cleanup 'remove' event [ 422.751922] kobject: 'ip6_vti0' (0000000061249934): kobject_uevent_env [ 422.764948] kobject: 'ip6_vti0' (0000000061249934): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 422.775051] kobject: 'queues' (000000008375ff8f): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 422.775083] kobject: 'sit0' (000000008178ac0b): kobject_uevent_env [ 422.785006] kobject: 'queues' (000000008375ff8f): kobject_uevent_env [ 422.796463] kobject: 'sit0' (000000008178ac0b): kobject_uevent_env: uevent_suppress caused the event to drop! 00:47:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) [ 422.797762] kobject: 'queues' (000000008375ff8f): kobject_uevent_env: filter function caused the event to drop! [ 422.811475] kobject: 'loop1' (0000000012192267): kobject_uevent_env [ 422.819682] kobject: 'sit0' (000000008178ac0b): calling ktype release [ 422.831383] kobject: 'sit0': free name [ 422.835360] kobject: 'rx-0' (00000000c05257cd): kobject_add_internal: parent: 'queues', set: 'queues' [ 422.837828] kobject: 'loop1' (0000000012192267): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 422.845072] kobject: 'rx-0' (00000000c05257cd): kobject_uevent_env [ 422.861986] kobject: 'rx-0' (00000000c05257cd): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 422.873362] kobject: 'tx-0' (00000000a507371c): kobject_add_internal: parent: 'queues', set: 'queues' [ 422.883093] kobject: 'tx-0' (00000000a507371c): kobject_uevent_env [ 422.889457] kobject: 'tx-0' (00000000a507371c): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 422.900664] kobject: 'sit0' (00000000259c31c9): kobject_cleanup, parent (null) 00:47:05 executing program 4: r0 = open(&(0x7f0000000680)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) r1 = eventfd(0x0) read(r1, &(0x7f00000006c0)=""/4096, 0x1000) open(&(0x7f00000000c0)='./file0\x00', 0x105001, 0x0) write(r1, &(0x7f0000000140)="4d44e1797a36b47d", 0x8) [ 422.900775] kobject: 'sit0' (000000007848090e): kobject_add_internal: parent: 'net', set: 'devices' [ 422.919356] kobject: 'sit0' (000000007848090e): kobject_uevent_env [ 422.926063] kobject: 'sit0' (000000007848090e): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 422.930914] kobject: 'sit0' (00000000259c31c9): auto cleanup 'remove' event [ 422.935679] kobject: 'queues' (000000008608e5e8): kobject_add_internal: parent: 'sit0', set: '' [ 422.952228] kobject: 'queues' (000000008608e5e8): kobject_uevent_env [ 422.960050] kobject: 'queues' (000000008608e5e8): kobject_uevent_env: filter function caused the event to drop! [ 422.960461] kobject: 'loop4' (00000000f17fdb83): kobject_uevent_env [ 422.970711] kobject: 'rx-0' (000000002123422f): kobject_add_internal: parent: 'queues', set: 'queues' [ 422.983733] kobject: 'sit0' (00000000259c31c9): kobject_uevent_env [ 422.986611] kobject: 'rx-0' (000000002123422f): kobject_uevent_env [ 422.996951] kobject: 'loop4' (00000000f17fdb83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 423.008695] kobject: 'sit0' (00000000259c31c9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.019093] kobject: 'rx-0' (000000002123422f): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 423.023968] kobject: 'loop0' (00000000f3025fcc): kobject_uevent_env [ 423.037388] kobject: 'sit0' (00000000259c31c9): calling ktype release [ 423.044359] kobject: 'tx-0' (000000000eafaecd): kobject_add_internal: parent: 'queues', set: 'queues' [ 423.048294] kobject: 'sit0': free name [ 423.057252] kobject: 'tx-0' (000000000eafaecd): kobject_uevent_env [ 423.058940] kobject: 'loop0' (00000000f3025fcc): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 423.064293] kobject: 'tx-0' (000000000eafaecd): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 423.079047] kobject: 'loop3' (000000009520f953): kobject_uevent_env [ 423.090454] kobject: 'loop3' (000000009520f953): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 423.093686] kobject: 'ip6tnl0' (00000000746954fa): kobject_add_internal: parent: 'net', set: 'devices' [ 423.110491] kobject: 'ip6tnl0' (00000000746954fa): kobject_uevent_env [ 423.117950] kobject: 'ip6tnl0' (00000000746954fa): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 423.128291] kobject: 'queues' (0000000015f5bd6a): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 423.137988] kobject: 'queues' (0000000015f5bd6a): kobject_uevent_env [ 423.144545] kobject: 'queues' (0000000015f5bd6a): kobject_uevent_env: filter function caused the event to drop! [ 423.154818] kobject: 'rx-0' (0000000093161c36): kobject_add_internal: parent: 'queues', set: 'queues' [ 423.164235] kobject: 'rx-0' (0000000093161c36): kobject_uevent_env [ 423.170575] kobject: 'rx-0' (0000000093161c36): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 423.181494] kobject: 'tx-0' (00000000497c7cdc): kobject_add_internal: parent: 'queues', set: 'queues' [ 423.184630] kobject: 'loop2' (0000000027f085a6): kobject_uevent_env [ 423.191032] kobject: 'tx-0' (00000000497c7cdc): kobject_uevent_env [ 423.199805] kobject: 'loop2' (0000000027f085a6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 423.203712] kobject: 'tx-0' (00000000497c7cdc): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 423.224584] kobject: 'rx-0' (00000000d741f93d): kobject_cleanup, parent 00000000ab45931a [ 423.232959] kobject: 'rx-0' (00000000d741f93d): auto cleanup 'remove' event [ 423.240069] kobject: 'rx-0' (00000000d741f93d): kobject_uevent_env [ 423.246474] kobject: 'rx-0' (00000000d741f93d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.256562] kobject: 'rx-0' (00000000d741f93d): auto cleanup kobject_del [ 423.263654] kobject: 'rx-0' (00000000d741f93d): calling ktype release [ 423.270222] kobject: 'rx-0': free name [ 423.274379] kobject: 'tx-0' (00000000e81107d6): kobject_cleanup, parent 00000000ab45931a [ 423.282663] kobject: 'tx-0' (00000000e81107d6): auto cleanup 'remove' event [ 423.289765] kobject: 'tx-0' (00000000e81107d6): kobject_uevent_env [ 423.296121] kobject: 'tx-0' (00000000e81107d6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.306237] kobject: 'tx-0' (00000000e81107d6): auto cleanup kobject_del [ 423.313155] kobject: 'tx-0' (00000000e81107d6): calling ktype release [ 423.319731] kobject: 'tx-0': free name [ 423.323684] kobject: 'queues' (00000000ab45931a): kobject_cleanup, parent (null) [ 423.332122] kobject: 'queues' (00000000ab45931a): calling ktype release [ 423.338877] kobject: 'queues' (00000000ab45931a): kset_release [ 423.344917] kobject: 'queues': free name [ 423.349336] kobject: 'ip6_vti0' (0000000014d639c1): kobject_uevent_env [ 423.356050] kobject: 'ip6_vti0' (0000000014d639c1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.367022] kobject: 'rx-0' (0000000045ee9681): kobject_cleanup, parent 0000000012df3cdb [ 423.375290] kobject: 'rx-0' (0000000045ee9681): auto cleanup 'remove' event [ 423.382449] kobject: 'rx-0' (0000000045ee9681): kobject_uevent_env [ 423.388758] kobject: 'rx-0' (0000000045ee9681): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.398834] kobject: 'rx-0' (0000000045ee9681): auto cleanup kobject_del [ 423.405837] kobject: 'rx-0' (0000000045ee9681): calling ktype release [ 423.412446] kobject: 'rx-0': free name [ 423.416351] kobject: 'tx-0' (000000007b5814e9): kobject_cleanup, parent 0000000012df3cdb [ 423.424636] kobject: 'tx-0' (000000007b5814e9): auto cleanup 'remove' event [ 423.431791] kobject: 'tx-0' (000000007b5814e9): kobject_uevent_env [ 423.438101] kobject: 'tx-0' (000000007b5814e9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.448226] kobject: 'tx-0' (000000007b5814e9): auto cleanup kobject_del [ 423.455100] kobject: 'tx-0' (000000007b5814e9): calling ktype release [ 423.461737] kobject: 'tx-0': free name [ 423.465631] kobject: 'queues' (0000000012df3cdb): kobject_cleanup, parent (null) [ 423.474050] kobject: 'queues' (0000000012df3cdb): calling ktype release [ 423.480796] kobject: 'queues' (0000000012df3cdb): kset_release [ 423.486820] kobject: 'queues': free name [ 423.491175] kobject: 'ip6_vti0' (00000000881df633): kobject_uevent_env [ 423.497826] kobject: 'ip6_vti0' (00000000881df633): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.508578] kobject: 'ip6gre0' (00000000f9095e1a): kobject_add_internal: parent: 'net', set: 'devices' [ 423.518834] kobject: 'ip6gre0' (00000000f9095e1a): kobject_uevent_env [ 423.525480] kobject: 'ip6gre0' (00000000f9095e1a): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 423.535202] kobject: 'queues' (00000000bcd09437): kobject_add_internal: parent: 'ip6gre0', set: '' [ 423.544862] kobject: 'queues' (00000000bcd09437): kobject_uevent_env [ 423.551403] kobject: 'queues' (00000000bcd09437): kobject_uevent_env: filter function caused the event to drop! [ 423.561676] kobject: 'rx-0' (00000000bf6efd5a): kobject_add_internal: parent: 'queues', set: 'queues' [ 423.571181] kobject: 'rx-0' (00000000bf6efd5a): kobject_uevent_env [ 423.577518] kobject: 'rx-0' (00000000bf6efd5a): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 423.588036] kobject: 'tx-0' (00000000ad009c28): kobject_add_internal: parent: 'queues', set: 'queues' [ 423.597532] kobject: 'tx-0' (00000000ad009c28): kobject_uevent_env [ 423.603921] kobject: 'tx-0' (00000000ad009c28): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 423.614994] kobject: 'ip6_vti0' (0000000014d639c1): kobject_cleanup, parent (null) [ 423.615817] kobject: 'syz_tun' (00000000e527b0ef): kobject_add_internal: parent: 'net', set: 'devices' [ 423.624024] kobject: 'ip6_vti0' (0000000014d639c1): auto cleanup 'remove' event [ 423.633918] kobject: 'syz_tun' (00000000e527b0ef): kobject_uevent_env [ 423.647652] kobject: 'syz_tun' (00000000e527b0ef): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 423.651444] kobject: 'ip6_vti0' (0000000014d639c1): kobject_uevent_env [ 423.657392] kobject: 'queues' (00000000c37bf835): kobject_add_internal: parent: 'syz_tun', set: '' [ 423.672854] kobject: 'ip6_vti0' (0000000014d639c1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.673973] kobject: 'queues' (00000000c37bf835): kobject_uevent_env [ 423.687782] kobject: 'ip6_vti0' (0000000014d639c1): calling ktype release [ 423.691487] kobject: 'loop1' (0000000012192267): kobject_uevent_env [ 423.697707] kobject: 'ip6_vti0': free name [ 423.704697] kobject: 'queues' (00000000c37bf835): kobject_uevent_env: filter function caused the event to drop! [ 423.713912] kobject: 'loop1' (0000000012192267): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 423.718496] kobject: 'rx-0' (00000000b056bfa6): kobject_add_internal: parent: 'queues', set: 'queues' [ 423.737363] kobject: 'rx-0' (00000000b056bfa6): kobject_uevent_env [ 423.743826] kobject: 'rx-0' (00000000b056bfa6): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 423.754294] kobject: 'tx-0' (00000000cdccd768): kobject_add_internal: parent: 'queues', set: 'queues' [ 423.763865] kobject: 'tx-0' (00000000cdccd768): kobject_uevent_env [ 423.770199] kobject: 'tx-0' (00000000cdccd768): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 423.781723] kobject: 'ip6_vti0' (00000000881df633): kobject_cleanup, parent (null) [ 423.790402] kobject: 'ip6_vti0' (00000000881df633): auto cleanup 'remove' event [ 423.798603] kobject: 'ip6_vti0' (00000000881df633): kobject_uevent_env [ 423.813235] kobject: 'ip6_vti0' (00000000881df633): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.823462] kobject: 'loop4' (00000000f17fdb83): kobject_uevent_env [ 423.824043] kobject: 'ip6_vti0' (00000000881df633): calling ktype release [ 423.830125] kobject: 'loop4' (00000000f17fdb83): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 423.837148] kobject: 'ip6_vti0': free name [ 423.857463] kobject: 'rx-0' (00000000a6b39951): kobject_cleanup, parent 000000007d6637ee [ 423.865879] kobject: 'rx-0' (00000000a6b39951): auto cleanup 'remove' event [ 423.880409] kobject: 'rx-0' (00000000a6b39951): kobject_uevent_env [ 423.886991] kobject: 'rx-0' (00000000a6b39951): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.897074] kobject: 'rx-0' (00000000a6b39951): auto cleanup kobject_del [ 423.904274] kobject: 'rx-0' (00000000a6b39951): calling ktype release [ 423.910842] kobject: 'rx-0': free name [ 423.914795] kobject: 'tx-0' (00000000015dd898): kobject_cleanup, parent 000000007d6637ee [ 423.923095] kobject: 'tx-0' (00000000015dd898): auto cleanup 'remove' event [ 423.930188] kobject: 'tx-0' (00000000015dd898): kobject_uevent_env [ 423.936518] kobject: 'tx-0' (00000000015dd898): kobject_uevent_env: uevent_suppress caused the event to drop! [ 423.946581] kobject: 'tx-0' (00000000015dd898): auto cleanup kobject_del [ 423.953481] kobject: 'tx-0' (00000000015dd898): calling ktype release [ 423.960054] kobject: 'tx-0': free name [ 423.963978] kobject: 'queues' (000000007d6637ee): kobject_cleanup, parent (null) [ 423.972397] kobject: 'queues' (000000007d6637ee): calling ktype release [ 423.979128] kobject: 'queues' (000000007d6637ee): kset_release [ 423.985125] kobject: 'queues': free name [ 423.989387] kobject: 'ip_vti0' (00000000775d0cac): kobject_uevent_env [ 423.995983] kobject: 'ip_vti0' (00000000775d0cac): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.006584] kobject: 'rx-0' (0000000021de4db6): kobject_cleanup, parent 000000005984a11b [ 424.014833] kobject: 'rx-0' (0000000021de4db6): auto cleanup 'remove' event [ 424.021944] kobject: 'rx-0' (0000000021de4db6): kobject_uevent_env [ 424.028243] kobject: 'rx-0' (0000000021de4db6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.038655] kobject: 'rx-0' (0000000021de4db6): auto cleanup kobject_del [ 424.045553] kobject: 'rx-0' (0000000021de4db6): calling ktype release [ 424.052289] kobject: 'rx-0': free name [ 424.056188] kobject: 'tx-0' (000000000bd056b2): kobject_cleanup, parent 000000005984a11b [ 424.064427] kobject: 'tx-0' (000000000bd056b2): auto cleanup 'remove' event [ 424.071538] kobject: 'tx-0' (000000000bd056b2): kobject_uevent_env [ 424.077837] kobject: 'tx-0' (000000000bd056b2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.087900] kobject: 'tx-0' (000000000bd056b2): auto cleanup kobject_del [ 424.094776] kobject: 'tx-0' (000000000bd056b2): calling ktype release [ 424.101367] kobject: 'tx-0': free name [ 424.105261] kobject: 'queues' (000000005984a11b): kobject_cleanup, parent (null) [ 424.113678] kobject: 'queues' (000000005984a11b): calling ktype release [ 424.120435] kobject: 'queues' (000000005984a11b): kset_release [ 424.126422] kobject: 'queues': free name [ 424.130689] kobject: 'ip_vti0' (000000000f9de059): kobject_uevent_env [ 424.137284] kobject: 'ip_vti0' (000000000f9de059): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.201221] kobject: 'ip_vti0' (00000000775d0cac): kobject_cleanup, parent (null) [ 424.209760] kobject: 'ip_vti0' (00000000775d0cac): auto cleanup 'remove' event [ 424.217545] kobject: 'ip_vti0' (00000000775d0cac): kobject_uevent_env [ 424.224448] kobject: 'ip_vti0' (00000000775d0cac): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.235049] kobject: 'ip_vti0' (00000000775d0cac): calling ktype release [ 424.242141] kobject: 'ip_vti0': free name [ 424.246385] kobject: 'ip_vti0' (000000000f9de059): kobject_cleanup, parent (null) [ 424.255199] kobject: 'ip_vti0' (000000000f9de059): auto cleanup 'remove' event [ 424.262796] kobject: 'ip_vti0' (000000000f9de059): kobject_uevent_env [ 424.269383] kobject: 'ip_vti0' (000000000f9de059): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.277711] kobject: 'ip6gretap0' (00000000d40ea87a): kobject_add_internal: parent: 'net', set: 'devices' [ 424.280086] kobject: 'ip_vti0' (000000000f9de059): calling ktype release [ 424.290397] kobject: 'ip6gretap0' (00000000d40ea87a): kobject_uevent_env [ 424.297005] kobject: 'ip_vti0': free name [ 424.303693] kobject: 'ip6gretap0' (00000000d40ea87a): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0' [ 424.318038] kobject: 'queues' (000000002ff0fcff): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 424.328081] kobject: 'queues' (000000002ff0fcff): kobject_uevent_env [ 424.334639] kobject: 'queues' (000000002ff0fcff): kobject_uevent_env: filter function caused the event to drop! [ 424.344950] kobject: 'rx-0' (000000000689b32a): kobject_add_internal: parent: 'queues', set: 'queues' [ 424.354399] kobject: 'rx-0' (000000000689b32a): kobject_uevent_env [ 424.360737] kobject: 'rx-0' (000000000689b32a): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/rx-0' [ 424.371561] kobject: 'tx-0' (00000000ec9065a4): kobject_add_internal: parent: 'queues', set: 'queues' [ 424.381031] kobject: 'tx-0' (00000000ec9065a4): kobject_uevent_env [ 424.387473] kobject: 'tx-0' (00000000ec9065a4): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/tx-0' [ 424.399797] kobject: 'rx-0' (0000000096be9dd8): kobject_cleanup, parent 000000007bc9ce1e [ 424.408083] kobject: 'rx-0' (0000000096be9dd8): auto cleanup 'remove' event [ 424.415495] kobject: 'rx-0' (0000000096be9dd8): kobject_uevent_env [ 424.422436] kobject: 'rx-0' (0000000096be9dd8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.432535] kobject: 'rx-0' (0000000096be9dd8): auto cleanup kobject_del [ 424.439391] kobject: 'rx-0' (0000000096be9dd8): calling ktype release [ 424.446137] kobject: 'rx-0': free name [ 424.450053] kobject: 'tx-0' (00000000eac33a46): kobject_cleanup, parent 000000007bc9ce1e [ 424.458297] kobject: 'tx-0' (00000000eac33a46): auto cleanup 'remove' event [ 424.465978] kobject: 'tx-0' (00000000eac33a46): kobject_uevent_env [ 424.472335] kobject: 'tx-0' (00000000eac33a46): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.482408] kobject: 'tx-0' (00000000eac33a46): auto cleanup kobject_del [ 424.489284] kobject: 'tx-0' (00000000eac33a46): calling ktype release [ 424.495891] kobject: 'tx-0': free name [ 424.499790] kobject: 'queues' (000000007bc9ce1e): kobject_cleanup, parent (null) [ 424.508203] kobject: 'queues' (000000007bc9ce1e): calling ktype release [ 424.514972] kobject: 'queues' (000000007bc9ce1e): kset_release [ 424.520924] kobject: 'queues': free name [ 424.525314] kobject: 'erspan0' (000000009b62b893): kobject_uevent_env [ 424.531902] kobject: 'erspan0' (000000009b62b893): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.542881] kobject: 'rx-0' (00000000e4477153): kobject_cleanup, parent 00000000b698180e [ 424.551374] kobject: 'rx-0' (00000000e4477153): auto cleanup 'remove' event [ 424.558459] kobject: 'rx-0' (00000000e4477153): kobject_uevent_env [ 424.564803] kobject: 'rx-0' (00000000e4477153): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.574867] kobject: 'rx-0' (00000000e4477153): auto cleanup kobject_del [ 424.581764] kobject: 'rx-0' (00000000e4477153): calling ktype release [ 424.588343] kobject: 'rx-0': free name [ 424.592289] kobject: 'tx-0' (0000000016732aa0): kobject_cleanup, parent 00000000b698180e [ 424.600510] kobject: 'tx-0' (0000000016732aa0): auto cleanup 'remove' event [ 424.607626] kobject: 'tx-0' (0000000016732aa0): kobject_uevent_env [ 424.613965] kobject: 'tx-0' (0000000016732aa0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.624044] kobject: 'tx-0' (0000000016732aa0): auto cleanup kobject_del [ 424.630917] kobject: 'tx-0' (0000000016732aa0): calling ktype release [ 424.637515] kobject: 'tx-0': free name [ 424.641430] kobject: 'queues' (00000000b698180e): kobject_cleanup, parent (null) [ 424.649813] kobject: 'queues' (00000000b698180e): calling ktype release [ 424.656580] kobject: 'queues' (00000000b698180e): kset_release [ 424.662568] kobject: 'queues': free name [ 424.666819] kobject: 'erspan0' (000000005efc5dc6): kobject_uevent_env [ 424.673423] kobject: 'erspan0' (000000005efc5dc6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.685093] kobject: 'bridge0' (00000000081fbb09): kobject_add_internal: parent: 'net', set: 'devices' [ 424.695108] kobject: 'bridge0' (00000000081fbb09): kobject_uevent_env [ 424.701896] kobject: 'bridge0' (00000000081fbb09): fill_kobj_path: path = '/devices/virtual/net/bridge0' [ 424.711708] kobject: 'queues' (00000000c77b750d): kobject_add_internal: parent: 'bridge0', set: '' [ 424.721379] kobject: 'queues' (00000000c77b750d): kobject_uevent_env [ 424.727869] kobject: 'queues' (00000000c77b750d): kobject_uevent_env: filter function caused the event to drop! [ 424.738198] kobject: 'rx-0' (00000000fa3e4363): kobject_add_internal: parent: 'queues', set: 'queues' [ 424.747656] kobject: 'rx-0' (00000000fa3e4363): kobject_uevent_env [ 424.754082] kobject: 'rx-0' (00000000fa3e4363): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/rx-0' [ 424.764608] kobject: 'tx-0' (00000000db5b7b09): kobject_add_internal: parent: 'queues', set: 'queues' [ 424.774216] kobject: 'tx-0' (00000000db5b7b09): kobject_uevent_env [ 424.780554] kobject: 'tx-0' (00000000db5b7b09): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/tx-0' [ 424.791946] kobject: 'brif' (0000000042f3c75e): kobject_add_internal: parent: 'bridge0', set: '' [ 424.801776] kobject: 'erspan0' (000000009b62b893): kobject_cleanup, parent (null) [ 424.810282] kobject: 'erspan0' (000000009b62b893): auto cleanup 'remove' event [ 424.818466] kobject: 'erspan0' (000000009b62b893): kobject_uevent_env [ 424.825280] kobject: 'erspan0' (000000009b62b893): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.829202] kobject: 'vcan0' (000000009f87cf3a): kobject_add_internal: parent: 'net', set: 'devices' [ 424.835924] kobject: 'erspan0' (000000009b62b893): calling ktype release [ 424.846545] kobject: 'vcan0' (000000009f87cf3a): kobject_uevent_env [ 424.852222] kobject: 'erspan0': free name [ 424.858383] kobject: 'vcan0' (000000009f87cf3a): fill_kobj_path: path = '/devices/virtual/net/vcan0' [ 424.872082] kobject: 'queues' (00000000ac97cfc8): kobject_add_internal: parent: 'vcan0', set: '' [ 424.881598] kobject: 'queues' (00000000ac97cfc8): kobject_uevent_env [ 424.888087] kobject: 'queues' (00000000ac97cfc8): kobject_uevent_env: filter function caused the event to drop! [ 424.898408] kobject: 'rx-0' (00000000b0663997): kobject_add_internal: parent: 'queues', set: 'queues' [ 424.907860] kobject: 'rx-0' (00000000b0663997): kobject_uevent_env [ 424.914334] kobject: 'rx-0' (00000000b0663997): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/rx-0' [ 424.924697] kobject: 'tx-0' (00000000df6cdd64): kobject_add_internal: parent: 'queues', set: 'queues' [ 424.934219] kobject: 'tx-0' (00000000df6cdd64): kobject_uevent_env [ 424.940546] kobject: 'tx-0' (00000000df6cdd64): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/tx-0' [ 424.951497] kobject: 'erspan0' (000000005efc5dc6): kobject_cleanup, parent (null) [ 424.960005] kobject: 'erspan0' (000000005efc5dc6): auto cleanup 'remove' event [ 424.967684] kobject: 'erspan0' (000000005efc5dc6): kobject_uevent_env [ 424.974490] kobject: 'erspan0' (000000005efc5dc6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 424.984851] kobject: 'erspan0' (000000005efc5dc6): calling ktype release [ 424.990249] kobject: 'bond0' (000000008964032c): kobject_add_internal: parent: 'net', set: 'devices' [ 424.991730] kobject: 'erspan0': free name [ 425.006225] kobject: 'bond0' (000000008964032c): kobject_uevent_env [ 425.012678] kobject: 'bond0' (000000008964032c): fill_kobj_path: path = '/devices/virtual/net/bond0' [ 425.022064] kobject: 'queues' (0000000045dd149f): kobject_add_internal: parent: 'bond0', set: '' [ 425.031546] kobject: 'queues' (0000000045dd149f): kobject_uevent_env [ 425.038035] kobject: 'queues' (0000000045dd149f): kobject_uevent_env: filter function caused the event to drop! [ 425.048312] kobject: 'rx-0' (000000008c94725b): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.057731] kobject: 'rx-0' (000000008c94725b): kobject_uevent_env [ 425.064134] kobject: 'rx-0' (000000008c94725b): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-0' [ 425.074457] kobject: 'rx-1' (00000000410d8c83): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.084183] kobject: 'rx-1' (00000000410d8c83): kobject_uevent_env [ 425.090512] kobject: 'rx-1' (00000000410d8c83): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-1' [ 425.100864] kobject: 'rx-2' (00000000c4c56cc8): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.110294] kobject: 'rx-2' (00000000c4c56cc8): kobject_uevent_env [ 425.116672] kobject: 'rx-2' (00000000c4c56cc8): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-2' [ 425.126975] kobject: 'rx-3' (00000000e46cbb44): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.136413] kobject: 'rx-3' (00000000e46cbb44): kobject_uevent_env [ 425.142772] kobject: 'rx-3' (00000000e46cbb44): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-3' [ 425.153099] kobject: 'rx-4' (000000001e92dd38): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.162517] kobject: 'rx-4' (000000001e92dd38): kobject_uevent_env [ 425.168836] kobject: 'rx-4' (000000001e92dd38): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-4' [ 425.179171] kobject: 'rx-5' (000000006ebe8d0d): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.188581] kobject: 'rx-5' (000000006ebe8d0d): kobject_uevent_env [ 425.194948] kobject: 'rx-5' (000000006ebe8d0d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-5' [ 425.205265] kobject: 'rx-6' (000000002afb93ed): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.214984] kobject: 'rx-6' (000000002afb93ed): kobject_uevent_env [ 425.221380] kobject: 'rx-6' (000000002afb93ed): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-6' [ 425.231704] kobject: 'rx-7' (00000000e02a1f6e): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.241166] kobject: 'rx-7' (00000000e02a1f6e): kobject_uevent_env [ 425.247508] kobject: 'rx-7' (00000000e02a1f6e): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-7' [ 425.257903] kobject: 'rx-8' (000000008bfe6a91): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.267380] kobject: 'rx-8' (000000008bfe6a91): kobject_uevent_env [ 425.273759] kobject: 'rx-8' (000000008bfe6a91): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-8' [ 425.284066] kobject: 'rx-9' (00000000ba3495ab): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.293529] kobject: 'rx-9' (00000000ba3495ab): kobject_uevent_env [ 425.299888] kobject: 'rx-9' (00000000ba3495ab): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-9' [ 425.310235] kobject: 'rx-10' (00000000b6c309ff): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.319737] kobject: 'rx-10' (00000000b6c309ff): kobject_uevent_env [ 425.326202] kobject: 'rx-10' (00000000b6c309ff): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-10' [ 425.336690] kobject: 'rx-11' (00000000f9cf3ad7): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.346529] kobject: 'rx-11' (00000000f9cf3ad7): kobject_uevent_env [ 425.353004] kobject: 'rx-11' (00000000f9cf3ad7): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-11' [ 425.363486] kobject: 'rx-12' (00000000fec433a6): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.373027] kobject: 'rx-12' (00000000fec433a6): kobject_uevent_env [ 425.379450] kobject: 'rx-12' (00000000fec433a6): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-12' [ 425.389965] kobject: 'rx-13' (000000003b83434d): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.399473] kobject: 'rx-13' (000000003b83434d): kobject_uevent_env [ 425.405939] kobject: 'rx-13' (000000003b83434d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-13' [ 425.416434] kobject: 'rx-14' (00000000b8dfe6f2): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.425965] kobject: 'rx-14' (00000000b8dfe6f2): kobject_uevent_env [ 425.432413] kobject: 'rx-14' (00000000b8dfe6f2): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-14' [ 425.442926] kobject: 'rx-15' (00000000fbb1e860): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.452435] kobject: 'rx-15' (00000000fbb1e860): kobject_uevent_env [ 425.458845] kobject: 'rx-15' (00000000fbb1e860): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-15' [ 425.469348] kobject: 'tx-0' (000000001d0810dd): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.479036] kobject: 'tx-0' (000000001d0810dd): kobject_uevent_env [ 425.485432] kobject: 'tx-0' (000000001d0810dd): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-0' [ 425.495746] kobject: 'tx-1' (0000000033f9c492): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.505370] kobject: 'tx-1' (0000000033f9c492): kobject_uevent_env [ 425.511752] kobject: 'tx-1' (0000000033f9c492): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-1' [ 425.522121] kobject: 'tx-2' (0000000054b81e68): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.531608] kobject: 'tx-2' (0000000054b81e68): kobject_uevent_env [ 425.537935] kobject: 'tx-2' (0000000054b81e68): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-2' [ 425.548262] kobject: 'tx-3' (00000000b3947afc): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.557743] kobject: 'tx-3' (00000000b3947afc): kobject_uevent_env [ 425.564126] kobject: 'tx-3' (00000000b3947afc): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-3' [ 425.574439] kobject: 'tx-4' (000000001740c70a): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.583982] kobject: 'tx-4' (000000001740c70a): kobject_uevent_env [ 425.590339] kobject: 'tx-4' (000000001740c70a): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-4' [ 425.600681] kobject: 'tx-5' (000000003d8f4dff): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.610393] kobject: 'tx-5' (000000003d8f4dff): kobject_uevent_env [ 425.616774] kobject: 'tx-5' (000000003d8f4dff): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-5' [ 425.627079] kobject: 'tx-6' (0000000010296bb6): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.636621] kobject: 'tx-6' (0000000010296bb6): kobject_uevent_env [ 425.642984] kobject: 'tx-6' (0000000010296bb6): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-6' [ 425.653311] kobject: 'tx-7' (00000000e36993de): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.662796] kobject: 'tx-7' (00000000e36993de): kobject_uevent_env [ 425.669127] kobject: 'tx-7' (00000000e36993de): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-7' [ 425.679466] kobject: 'tx-8' (00000000d8e0787c): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.688955] kobject: 'tx-8' (00000000d8e0787c): kobject_uevent_env [ 425.695328] kobject: 'tx-8' (00000000d8e0787c): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-8' [ 425.705649] kobject: 'tx-9' (00000000aeedfe52): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.715198] kobject: 'tx-9' (00000000aeedfe52): kobject_uevent_env [ 425.721559] kobject: 'tx-9' (00000000aeedfe52): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-9' [ 425.732477] kobject: 'tx-10' (00000000e4e1d7cc): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.742200] kobject: 'tx-10' (00000000e4e1d7cc): kobject_uevent_env [ 425.748641] kobject: 'tx-10' (00000000e4e1d7cc): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-10' [ 425.759171] kobject: 'tx-11' (000000000695087f): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.768752] kobject: 'tx-11' (000000000695087f): kobject_uevent_env [ 425.775224] kobject: 'tx-11' (000000000695087f): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-11' [ 425.785733] kobject: 'tx-12' (00000000c8f9a58d): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.795367] kobject: 'tx-12' (00000000c8f9a58d): kobject_uevent_env [ 425.801818] kobject: 'tx-12' (00000000c8f9a58d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-12' [ 425.812339] kobject: 'tx-13' (000000004238c457): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.821927] kobject: 'tx-13' (000000004238c457): kobject_uevent_env [ 425.828338] kobject: 'tx-13' (000000004238c457): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-13' [ 425.838866] kobject: 'tx-14' (00000000a0d81bca): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.848438] kobject: 'tx-14' (00000000a0d81bca): kobject_uevent_env [ 425.854895] kobject: 'tx-14' (00000000a0d81bca): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-14' [ 425.865579] kobject: 'tx-15' (000000006812a273): kobject_add_internal: parent: 'queues', set: 'queues' [ 425.875248] kobject: 'tx-15' (000000006812a273): kobject_uevent_env [ 425.881714] kobject: 'tx-15' (000000006812a273): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-15' [ 425.893904] kobject: 'rx-0' (0000000091447e3c): kobject_cleanup, parent 00000000a14a3df0 [ 425.902252] kobject: 'rx-0' (0000000091447e3c): auto cleanup 'remove' event [ 425.909354] kobject: 'rx-0' (0000000091447e3c): kobject_uevent_env [ 425.916045] kobject: 'rx-0' (0000000091447e3c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 425.926232] kobject: 'rx-0' (0000000091447e3c): auto cleanup kobject_del [ 425.933212] kobject: 'rx-0' (0000000091447e3c): calling ktype release [ 425.939863] kobject: 'rx-0': free name [ 425.943865] kobject: 'tx-0' (00000000f33a80ec): kobject_cleanup, parent 00000000a14a3df0 [ 425.952120] kobject: 'tx-0' (00000000f33a80ec): auto cleanup 'remove' event [ 425.959204] kobject: 'tx-0' (00000000f33a80ec): kobject_uevent_env [ 425.965569] kobject: 'tx-0' (00000000f33a80ec): kobject_uevent_env: uevent_suppress caused the event to drop! [ 425.975667] kobject: 'tx-0' (00000000f33a80ec): auto cleanup kobject_del [ 425.982708] kobject: 'tx-0' (00000000f33a80ec): calling ktype release [ 425.989281] kobject: 'tx-0': free name [ 425.993220] kobject: 'queues' (00000000a14a3df0): kobject_cleanup, parent (null) [ 426.001666] kobject: 'queues' (00000000a14a3df0): calling ktype release [ 426.008404] kobject: 'queues' (00000000a14a3df0): kset_release [ 426.014433] kobject: 'queues': free name [ 426.018693] kobject: 'gretap0' (000000007edda3e1): kobject_uevent_env [ 426.025345] kobject: 'gretap0' (000000007edda3e1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 426.036317] kobject: 'rx-0' (000000002dff2473): kobject_cleanup, parent 0000000001345032 [ 426.044605] kobject: 'rx-0' (000000002dff2473): auto cleanup 'remove' event [ 426.051746] kobject: 'rx-0' (000000002dff2473): kobject_uevent_env [ 426.058058] kobject: 'rx-0' (000000002dff2473): kobject_uevent_env: uevent_suppress caused the event to drop! [ 426.068199] kobject: 'rx-0' (000000002dff2473): auto cleanup kobject_del [ 426.075099] kobject: 'rx-0' (000000002dff2473): calling ktype release [ 426.081897] kobject: 'rx-0': free name [ 426.085802] kobject: 'tx-0' (000000007035777a): kobject_cleanup, parent 0000000001345032 [ 426.094050] kobject: 'tx-0' (000000007035777a): auto cleanup 'remove' event [ 426.101197] kobject: 'tx-0' (000000007035777a): kobject_uevent_env [ 426.107515] kobject: 'tx-0' (000000007035777a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 426.117608] kobject: 'tx-0' (000000007035777a): auto cleanup kobject_del [ 426.124530] kobject: 'tx-0' (000000007035777a): calling ktype release [ 426.131152] kobject: 'tx-0': free name [ 426.135071] kobject: 'queues' (0000000001345032): kobject_cleanup, parent (null) [ 426.143556] kobject: 'queues' (0000000001345032): calling ktype release [ 426.150320] kobject: 'queues' (0000000001345032): kset_release [ 426.156337] kobject: 'queues': free name [ 426.160616] kobject: 'gretap0' (000000005619ac82): kobject_uevent_env [ 426.167313] kobject: 'gretap0' (000000005619ac82): kobject_uevent_env: uevent_suppress caused the event to drop! [ 426.178949] kobject: 'team0' (000000004def9fb4): kobject_add_internal: parent: 'net', set: 'devices' [ 426.188864] kobject: 'team0' (000000004def9fb4): kobject_uevent_env [ 426.195337] kobject: 'team0' (000000004def9fb4): fill_kobj_path: path = '/devices/virtual/net/team0' [ 426.204796] kobject: 'queues' (00000000941ebb1f): kobject_add_internal: parent: 'team0', set: '' [ 426.214315] kobject: 'queues' (00000000941ebb1f): kobject_uevent_env [ 426.220801] kobject: 'queues' (00000000941ebb1f): kobject_uevent_env: filter function caused the event to drop! [ 426.231205] kobject: 'rx-0' (0000000007e23d8d): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.240615] kobject: 'rx-0' (0000000007e23d8d): kobject_uevent_env [ 426.247018] kobject: 'rx-0' (0000000007e23d8d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-0' [ 426.257380] kobject: 'rx-1' (0000000094cb7486): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.266842] kobject: 'rx-1' (0000000094cb7486): kobject_uevent_env [ 426.273241] kobject: 'rx-1' (0000000094cb7486): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-1' [ 426.283576] kobject: 'rx-2' (000000009efecd29): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.293018] kobject: 'rx-2' (000000009efecd29): kobject_uevent_env [ 426.299358] kobject: 'rx-2' (000000009efecd29): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-2' [ 426.309705] kobject: 'rx-3' (00000000802cdc4a): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.319192] kobject: 'rx-3' (00000000802cdc4a): kobject_uevent_env [ 426.325578] kobject: 'rx-3' (00000000802cdc4a): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-3' [ 426.336071] kobject: 'rx-4' (0000000015807c0c): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.345544] kobject: 'rx-4' (0000000015807c0c): kobject_uevent_env [ 426.351938] kobject: 'rx-4' (0000000015807c0c): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-4' [ 426.362279] kobject: 'rx-5' (00000000de4858e5): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.371729] kobject: 'rx-5' (00000000de4858e5): kobject_uevent_env [ 426.378053] kobject: 'rx-5' (00000000de4858e5): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-5' [ 426.388453] kobject: 'rx-6' (0000000054035074): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.397904] kobject: 'rx-6' (0000000054035074): kobject_uevent_env [ 426.404300] kobject: 'rx-6' (0000000054035074): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-6' [ 426.414665] kobject: 'rx-7' (00000000ac3933e1): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.424125] kobject: 'rx-7' (00000000ac3933e1): kobject_uevent_env [ 426.430470] kobject: 'rx-7' (00000000ac3933e1): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-7' [ 426.440862] kobject: 'rx-8' (00000000a13073b8): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.450281] kobject: 'rx-8' (00000000a13073b8): kobject_uevent_env [ 426.456688] kobject: 'rx-8' (00000000a13073b8): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-8' [ 426.467055] kobject: 'rx-9' (000000008fe26288): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.476535] kobject: 'rx-9' (000000008fe26288): kobject_uevent_env [ 426.482917] kobject: 'rx-9' (000000008fe26288): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-9' [ 426.493310] kobject: 'rx-10' (000000001d646f83): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.502834] kobject: 'rx-10' (000000001d646f83): kobject_uevent_env [ 426.509261] kobject: 'rx-10' (000000001d646f83): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-10' [ 426.519939] kobject: 'rx-11' (000000006c606d2e): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.529472] kobject: 'rx-11' (000000006c606d2e): kobject_uevent_env [ 426.536002] kobject: 'rx-11' (000000006c606d2e): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-11' [ 426.547632] kobject: 'rx-12' (000000006bb6cb02): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.557260] kobject: 'rx-12' (000000006bb6cb02): kobject_uevent_env [ 426.563711] kobject: 'rx-12' (000000006bb6cb02): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-12' [ 426.574283] kobject: 'rx-13' (00000000d49fb2d3): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.583831] kobject: 'rx-13' (00000000d49fb2d3): kobject_uevent_env [ 426.590265] kobject: 'rx-13' (00000000d49fb2d3): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-13' [ 426.601018] kobject: 'rx-14' (00000000453466dd): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.610578] kobject: 'rx-14' (00000000453466dd): kobject_uevent_env [ 426.617060] kobject: 'rx-14' (00000000453466dd): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-14' [ 426.627604] kobject: 'rx-15' (0000000037064605): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.637159] kobject: 'rx-15' (0000000037064605): kobject_uevent_env [ 426.643625] kobject: 'rx-15' (0000000037064605): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-15' [ 426.654161] kobject: 'tx-0' (0000000078ce2ab9): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.663725] kobject: 'tx-0' (0000000078ce2ab9): kobject_uevent_env [ 426.670081] kobject: 'tx-0' (0000000078ce2ab9): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-0' [ 426.680471] kobject: 'tx-1' (00000000a9b93c4d): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.689971] kobject: 'tx-1' (00000000a9b93c4d): kobject_uevent_env [ 426.696394] kobject: 'tx-1' (00000000a9b93c4d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-1' [ 426.706739] kobject: 'tx-2' (00000000c60f620e): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.716334] kobject: 'tx-2' (00000000c60f620e): kobject_uevent_env [ 426.722694] kobject: 'tx-2' (00000000c60f620e): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-2' [ 426.733063] kobject: 'tx-3' (000000007a784db3): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.742536] kobject: 'tx-3' (000000007a784db3): kobject_uevent_env [ 426.748861] kobject: 'tx-3' (000000007a784db3): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-3' [ 426.759249] kobject: 'tx-4' (00000000f1f3d53c): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.768731] kobject: 'tx-4' (00000000f1f3d53c): kobject_uevent_env [ 426.775158] kobject: 'tx-4' (00000000f1f3d53c): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-4' [ 426.785462] kobject: 'tx-5' (0000000040aa608b): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.795067] kobject: 'tx-5' (0000000040aa608b): kobject_uevent_env [ 426.801438] kobject: 'tx-5' (0000000040aa608b): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-5' [ 426.811831] kobject: 'tx-6' (000000007afbcffd): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.821305] kobject: 'tx-6' (000000007afbcffd): kobject_uevent_env [ 426.827627] kobject: 'tx-6' (000000007afbcffd): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-6' [ 426.838006] kobject: 'tx-7' (00000000094235e4): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.847510] kobject: 'tx-7' (00000000094235e4): kobject_uevent_env [ 426.854050] kobject: 'tx-7' (00000000094235e4): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-7' [ 426.864354] kobject: 'tx-8' (0000000064a50b3c): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.873945] kobject: 'tx-8' (0000000064a50b3c): kobject_uevent_env [ 426.880282] kobject: 'tx-8' (0000000064a50b3c): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-8' [ 426.892931] kobject: 'tx-9' (0000000023f8df9e): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.902573] kobject: 'tx-9' (0000000023f8df9e): kobject_uevent_env [ 426.908902] kobject: 'tx-9' (0000000023f8df9e): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-9' [ 426.921436] kobject: 'tx-10' (000000001ad0a093): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.930978] kobject: 'tx-10' (000000001ad0a093): kobject_uevent_env [ 426.937751] kobject: 'tx-10' (000000001ad0a093): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-10' [ 426.948266] kobject: 'tx-11' (000000004bad6822): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.957871] kobject: 'tx-11' (000000004bad6822): kobject_uevent_env [ 426.964315] kobject: 'tx-11' (000000004bad6822): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-11' [ 426.974797] kobject: 'tx-12' (00000000d6389293): kobject_add_internal: parent: 'queues', set: 'queues' [ 426.984460] kobject: 'tx-12' (00000000d6389293): kobject_uevent_env [ 426.990878] kobject: 'tx-12' (00000000d6389293): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-12' [ 427.001375] kobject: 'tx-13' (00000000176dc44a): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.010916] kobject: 'tx-13' (00000000176dc44a): kobject_uevent_env [ 427.017651] kobject: 'tx-13' (00000000176dc44a): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-13' [ 427.028186] kobject: 'tx-14' (00000000f58b21db): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.037773] kobject: 'tx-14' (00000000f58b21db): kobject_uevent_env [ 427.044222] kobject: 'tx-14' (00000000f58b21db): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-14' [ 427.054696] kobject: 'tx-15' (000000001f4a3ff6): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.064340] kobject: 'tx-15' (000000001f4a3ff6): kobject_uevent_env [ 427.070768] kobject: 'tx-15' (000000001f4a3ff6): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-15' [ 427.081937] kobject: 'gretap0' (000000007edda3e1): kobject_cleanup, parent (null) [ 427.090449] kobject: 'gretap0' (000000007edda3e1): auto cleanup 'remove' event [ 427.098209] kobject: 'gretap0' (000000007edda3e1): kobject_uevent_env [ 427.105010] kobject: 'gretap0' (000000007edda3e1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 427.109887] kobject: 'veth0' (00000000a44c6a29): kobject_add_internal: parent: 'net', set: 'devices' [ 427.115627] kobject: 'gretap0' (000000007edda3e1): calling ktype release [ 427.126135] kobject: 'veth0' (00000000a44c6a29): kobject_uevent_env [ 427.131816] kobject: 'gretap0': free name [ 427.137975] kobject: 'veth0' (00000000a44c6a29): fill_kobj_path: path = '/devices/virtual/net/veth0' [ 427.151606] kobject: 'queues' (0000000082bc471a): kobject_add_internal: parent: 'veth0', set: '' [ 427.161135] kobject: 'queues' (0000000082bc471a): kobject_uevent_env [ 427.167638] kobject: 'queues' (0000000082bc471a): kobject_uevent_env: filter function caused the event to drop! [ 427.177922] kobject: 'rx-0' (00000000afc5010d): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.187340] kobject: 'rx-0' (00000000afc5010d): kobject_uevent_env [ 427.193710] kobject: 'rx-0' (00000000afc5010d): fill_kobj_path: path = '/devices/virtual/net/veth0/queues/rx-0' [ 427.204007] kobject: 'tx-0' (000000002e3235c8): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.213543] kobject: 'tx-0' (000000002e3235c8): kobject_uevent_env [ 427.219883] kobject: 'tx-0' (000000002e3235c8): fill_kobj_path: path = '/devices/virtual/net/veth0/queues/tx-0' [ 427.231293] kobject: 'veth1' (000000003449f991): kobject_add_internal: parent: 'net', set: 'devices' [ 427.241017] kobject: 'veth1' (000000003449f991): kobject_uevent_env [ 427.247540] kobject: 'veth1' (000000003449f991): fill_kobj_path: path = '/devices/virtual/net/veth1' [ 427.256904] kobject: 'queues' (0000000065a8ee8e): kobject_add_internal: parent: 'veth1', set: '' [ 427.266436] kobject: 'queues' (0000000065a8ee8e): kobject_uevent_env [ 427.272951] kobject: 'queues' (0000000065a8ee8e): kobject_uevent_env: filter function caused the event to drop! [ 427.283231] kobject: 'rx-0' (000000009cad9786): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.292655] kobject: 'rx-0' (000000009cad9786): kobject_uevent_env [ 427.298978] kobject: 'rx-0' (000000009cad9786): fill_kobj_path: path = '/devices/virtual/net/veth1/queues/rx-0' [ 427.309310] kobject: 'tx-0' (0000000051f8e556): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.318796] kobject: 'tx-0' (0000000051f8e556): kobject_uevent_env [ 427.325189] kobject: 'tx-0' (0000000051f8e556): fill_kobj_path: path = '/devices/virtual/net/veth1/queues/tx-0' [ 427.336341] kobject: 'gretap0' (000000005619ac82): kobject_cleanup, parent (null) [ 427.345052] kobject: 'gretap0' (000000005619ac82): auto cleanup 'remove' event [ 427.352465] kobject: 'gretap0' (000000005619ac82): kobject_uevent_env [ 427.359052] kobject: 'gretap0' (000000005619ac82): kobject_uevent_env: uevent_suppress caused the event to drop! [ 427.365236] kobject: 'veth0_to_bridge' (00000000d82c772f): kobject_add_internal: parent: 'net', set: 'devices' [ 427.369449] kobject: 'gretap0' (000000005619ac82): calling ktype release [ 427.380672] kobject: 'veth0_to_bridge' (00000000d82c772f): kobject_uevent_env [ 427.386443] kobject: 'gretap0': free name [ 427.393947] kobject: 'veth0_to_bridge' (00000000d82c772f): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge' [ 427.409305] kobject: 'queues' (00000000c94d3eb6): kobject_add_internal: parent: 'veth0_to_bridge', set: '' [ 427.419684] kobject: 'queues' (00000000c94d3eb6): kobject_uevent_env [ 427.426214] kobject: 'queues' (00000000c94d3eb6): kobject_uevent_env: filter function caused the event to drop! [ 427.436493] kobject: 'rx-0' (0000000060790ca2): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.445914] kobject: 'rx-0' (0000000060790ca2): kobject_uevent_env [ 427.452565] kobject: 'rx-0' (0000000060790ca2): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge/queues/rx-0' [ 427.463801] kobject: 'tx-0' (00000000fcb737db): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.473275] kobject: 'tx-0' (00000000fcb737db): kobject_uevent_env [ 427.479594] kobject: 'tx-0' (00000000fcb737db): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge/queues/tx-0' [ 427.491469] kobject: 'bridge_slave_0' (0000000076eb76f3): kobject_add_internal: parent: 'net', set: 'devices' [ 427.502077] kobject: 'bridge_slave_0' (0000000076eb76f3): kobject_uevent_env [ 427.509267] kobject: 'bridge_slave_0' (0000000076eb76f3): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0' [ 427.520221] kobject: 'queues' (00000000e6eba1bb): kobject_add_internal: parent: 'bridge_slave_0', set: '' [ 427.530483] kobject: 'queues' (00000000e6eba1bb): kobject_uevent_env [ 427.536998] kobject: 'queues' (00000000e6eba1bb): kobject_uevent_env: filter function caused the event to drop! [ 427.547254] kobject: 'rx-0' (00000000eee4e37f): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.556701] kobject: 'rx-0' (00000000eee4e37f): kobject_uevent_env [ 427.563056] kobject: 'rx-0' (00000000eee4e37f): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0/queues/rx-0' [ 427.574181] kobject: 'tx-0' (00000000b3d0c832): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.583868] kobject: 'tx-0' (00000000b3d0c832): kobject_uevent_env [ 427.590191] kobject: 'tx-0' (00000000b3d0c832): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0/queues/tx-0' [ 427.602490] kobject: 'rx-0' (00000000aa16d4ce): kobject_cleanup, parent 000000005e8e65d9 [ 427.610734] kobject: 'rx-0' (00000000aa16d4ce): auto cleanup 'remove' event [ 427.618132] kobject: 'rx-0' (00000000aa16d4ce): kobject_uevent_env [ 427.624781] kobject: 'rx-0' (00000000aa16d4ce): kobject_uevent_env: uevent_suppress caused the event to drop! [ 427.634913] kobject: 'rx-0' (00000000aa16d4ce): auto cleanup kobject_del [ 427.641866] kobject: 'rx-0' (00000000aa16d4ce): calling ktype release [ 427.648425] kobject: 'rx-0': free name [ 427.652393] kobject: 'tx-0' (00000000e78d8138): kobject_cleanup, parent 000000005e8e65d9 [ 427.660619] kobject: 'tx-0' (00000000e78d8138): auto cleanup 'remove' event [ 427.667807] kobject: 'tx-0' (00000000e78d8138): kobject_uevent_env [ 427.674188] kobject: 'tx-0' (00000000e78d8138): kobject_uevent_env: uevent_suppress caused the event to drop! [ 427.684280] kobject: 'tx-0' (00000000e78d8138): auto cleanup kobject_del [ 427.691216] kobject: 'tx-0' (00000000e78d8138): calling ktype release [ 427.697792] kobject: 'tx-0': free name [ 427.701749] kobject: 'queues' (000000005e8e65d9): kobject_cleanup, parent (null) [ 427.710149] kobject: 'queues' (000000005e8e65d9): calling ktype release [ 427.716936] kobject: 'queues' (000000005e8e65d9): kset_release [ 427.722955] kobject: 'queues': free name [ 427.727206] kobject: 'gre0' (0000000090c5c997): kobject_uevent_env [ 427.733555] kobject: 'gre0' (0000000090c5c997): kobject_uevent_env: uevent_suppress caused the event to drop! [ 427.743960] kobject: 'rx-0' (00000000e5ef2ce8): kobject_cleanup, parent 000000006bf74f03 [ 427.752228] kobject: 'rx-0' (00000000e5ef2ce8): auto cleanup 'remove' event [ 427.759330] kobject: 'rx-0' (00000000e5ef2ce8): kobject_uevent_env [ 427.765709] kobject: 'rx-0' (00000000e5ef2ce8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 427.775809] kobject: 'rx-0' (00000000e5ef2ce8): auto cleanup kobject_del [ 427.782834] kobject: 'rx-0' (00000000e5ef2ce8): calling ktype release [ 427.789412] kobject: 'rx-0': free name [ 427.793367] kobject: 'tx-0' (00000000e8be5195): kobject_cleanup, parent 000000006bf74f03 [ 427.801645] kobject: 'tx-0' (00000000e8be5195): auto cleanup 'remove' event [ 427.808728] kobject: 'tx-0' (00000000e8be5195): kobject_uevent_env [ 427.815060] kobject: 'tx-0' (00000000e8be5195): kobject_uevent_env: uevent_suppress caused the event to drop! [ 427.825179] kobject: 'tx-0' (00000000e8be5195): auto cleanup kobject_del [ 427.832077] kobject: 'tx-0' (00000000e8be5195): calling ktype release [ 427.838664] kobject: 'tx-0': free name [ 427.842615] kobject: 'queues' (000000006bf74f03): kobject_cleanup, parent (null) [ 427.851015] kobject: 'queues' (000000006bf74f03): calling ktype release [ 427.857782] kobject: 'queues' (000000006bf74f03): kset_release [ 427.863792] kobject: 'queues': free name [ 427.868074] kobject: 'gre0' (00000000a9e85e90): kobject_uevent_env [ 427.874427] kobject: 'gre0' (00000000a9e85e90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 427.885727] kobject: 'veth1_to_bridge' (00000000ed2afe93): kobject_add_internal: parent: 'net', set: 'devices' [ 427.896633] kobject: 'veth1_to_bridge' (00000000ed2afe93): kobject_uevent_env [ 427.903984] kobject: 'veth1_to_bridge' (00000000ed2afe93): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bridge' [ 427.915088] kobject: 'queues' (00000000980593b4): kobject_add_internal: parent: 'veth1_to_bridge', set: '' [ 427.925458] kobject: 'queues' (00000000980593b4): kobject_uevent_env [ 427.931969] kobject: 'queues' (00000000980593b4): kobject_uevent_env: filter function caused the event to drop! [ 427.942238] kobject: 'rx-0' (00000000dbaf152e): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.951658] kobject: 'rx-0' (00000000dbaf152e): kobject_uevent_env [ 427.957981] kobject: 'rx-0' (00000000dbaf152e): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bridge/queues/rx-0' [ 427.969179] kobject: 'tx-0' (00000000dcd7d43f): kobject_add_internal: parent: 'queues', set: 'queues' [ 427.978658] kobject: 'tx-0' (00000000dcd7d43f): kobject_uevent_env [ 427.985175] kobject: 'tx-0' (00000000dcd7d43f): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bridge/queues/tx-0' [ 427.996921] kobject: 'bridge_slave_1' (00000000f70fefeb): kobject_add_internal: parent: 'net', set: 'devices' [ 428.007571] kobject: 'bridge_slave_1' (00000000f70fefeb): kobject_uevent_env [ 428.014783] kobject: 'bridge_slave_1' (00000000f70fefeb): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_1' [ 428.026004] kobject: 'queues' (00000000715aff72): kobject_add_internal: parent: 'bridge_slave_1', set: '' [ 428.036292] kobject: 'queues' (00000000715aff72): kobject_uevent_env [ 428.043081] kobject: 'queues' (00000000715aff72): kobject_uevent_env: filter function caused the event to drop! [ 428.053341] kobject: 'rx-0' (00000000610b4c55): kobject_add_internal: parent: 'queues', set: 'queues' [ 428.062753] kobject: 'rx-0' (00000000610b4c55): kobject_uevent_env [ 428.069071] kobject: 'rx-0' (00000000610b4c55): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_1/queues/rx-0' [ 428.080195] kobject: 'tx-0' (00000000abe1a677): kobject_add_internal: parent: 'queues', set: 'queues' [ 428.089671] kobject: 'tx-0' (00000000abe1a677): kobject_uevent_env [ 428.096035] kobject: 'tx-0' (00000000abe1a677): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_1/queues/tx-0' [ 428.107709] kobject: 'gre0' (0000000090c5c997): kobject_cleanup, parent (null) [ 428.116201] kobject: 'gre0' (0000000090c5c997): auto cleanup 'remove' event [ 428.123386] kobject: 'gre0' (0000000090c5c997): kobject_uevent_env [ 428.129832] kobject: 'gre0' (0000000090c5c997): kobject_uevent_env: uevent_suppress caused the event to drop! [ 428.137482] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.139946] kobject: 'gre0' (0000000090c5c997): calling ktype release [ 428.146425] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.153028] kobject: 'gre0': free name [ 428.159677] kobject: 'brport' (00000000bc72534e): kobject_add_internal: parent: 'bridge_slave_0', set: '' [ 428.173743] device bridge_slave_0 entered promiscuous mode [ 428.179929] kobject: 'brport' (00000000bc72534e): kobject_uevent_env [ 428.186476] kobject: 'brport' (00000000bc72534e): kobject_uevent_env: filter function caused the event to drop! [ 428.196827] kobject: 'gre0' (00000000a9e85e90): kobject_cleanup, parent (null) [ 428.205235] kobject: 'gre0' (00000000a9e85e90): auto cleanup 'remove' event [ 428.212421] kobject: 'gre0' (00000000a9e85e90): kobject_uevent_env [ 428.218864] kobject: 'gre0' (00000000a9e85e90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 428.226497] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.229001] kobject: 'gre0' (00000000a9e85e90): calling ktype release [ 428.235477] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.242081] kobject: 'gre0': free name [ 428.248379] kobject: 'brport' (0000000008d8f3c9): kobject_add_internal: parent: 'bridge_slave_1', set: '' [ 428.262831] device bridge_slave_1 entered promiscuous mode [ 428.268891] kobject: 'brport' (0000000008d8f3c9): kobject_uevent_env [ 428.275415] kobject: 'brport' (0000000008d8f3c9): kobject_uevent_env: filter function caused the event to drop! [ 428.286471] kobject: 'rx-0' (00000000b017a6da): kobject_cleanup, parent 00000000edf74043 [ 428.295522] kobject: 'rx-0' (00000000b017a6da): auto cleanup 'remove' event [ 428.304652] kobject: 'rx-0' (00000000b017a6da): kobject_uevent_env [ 428.311060] kobject: 'rx-0' (00000000b017a6da): kobject_uevent_env: uevent_suppress caused the event to drop! [ 428.321551] kobject: 'rx-0' (00000000b017a6da): auto cleanup kobject_del [ 428.328417] kobject: 'rx-0' (00000000b017a6da): calling ktype release [ 428.335270] kobject: 'rx-0': free name [ 428.339182] kobject: 'tx-0' (00000000a72944a8): kobject_cleanup, parent 00000000edf74043 [ 428.347434] kobject: 'tx-0' (00000000a72944a8): auto cleanup 'remove' event [ 428.354586] kobject: 'tx-0' (00000000a72944a8): kobject_uevent_env [ 428.360897] kobject: 'tx-0' (00000000a72944a8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 428.370972] kobject: 'tx-0' (00000000a72944a8): auto cleanup kobject_del [ 428.377879] kobject: 'tx-0' (00000000a72944a8): calling ktype release [ 428.384498] kobject: 'tx-0': free name [ 428.388391] kobject: 'queues' (00000000edf74043): kobject_cleanup, parent (null) [ 428.396847] kobject: 'queues' (00000000edf74043): calling ktype release [ 428.403626] kobject: 'queues' (00000000edf74043): kset_release [ 428.409583] kobject: 'queues': free name [ 428.413973] kobject: 'tunl0' (000000007239357a): kobject_uevent_env [ 428.420366] kobject: 'tunl0' (000000007239357a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 428.430893] kobject: 'rx-0' (000000006959d145): kobject_cleanup, parent 000000001976c2e5 [ 428.439169] kobject: 'rx-0' (000000006959d145): auto cleanup 'remove' event [ 428.446298] kobject: 'rx-0' (000000006959d145): kobject_uevent_env [ 428.452673] kobject: 'rx-0' (000000006959d145): kobject_uevent_env: uevent_suppress caused the event to drop! [ 428.462836] kobject: 'rx-0' (000000006959d145): auto cleanup kobject_del [ 428.469692] kobject: 'rx-0' (000000006959d145): calling ktype release [ 428.476385] kobject: 'rx-0': free name [ 428.480299] kobject: 'tx-0' (0000000072e29405): kobject_cleanup, parent 000000001976c2e5 [ 428.488557] kobject: 'tx-0' (0000000072e29405): auto cleanup 'remove' event [ 428.495696] kobject: 'tx-0' (0000000072e29405): kobject_uevent_env [ 428.502035] kobject: 'tx-0' (0000000072e29405): kobject_uevent_env: uevent_suppress caused the event to drop! [ 428.512165] kobject: 'tx-0' (0000000072e29405): auto cleanup kobject_del [ 428.519085] kobject: 'tx-0' (0000000072e29405): calling ktype release [ 428.525700] kobject: 'tx-0': free name [ 428.529594] kobject: 'queues' (000000001976c2e5): kobject_cleanup, parent (null) [ 428.538049] kobject: 'queues' (000000001976c2e5): calling ktype release [ 428.545454] kobject: 'queues' (000000001976c2e5): kset_release [ 428.551483] kobject: 'queues': free name [ 428.555749] kobject: 'tunl0' (000000002962306e): kobject_uevent_env [ 428.562190] kobject: 'tunl0' (000000002962306e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 428.573657] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 428.597157] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 428.611311] kobject: 'tunl0' (000000007239357a): kobject_cleanup, parent (null) [ 428.619640] kobject: 'tunl0' (000000007239357a): auto cleanup 'remove' event [ 428.625231] kobject: 'veth0_to_bond' (0000000079121fac): kobject_add_internal: parent: 'net', set: 'devices' [ 428.627034] kobject: 'tunl0' (000000007239357a): kobject_uevent_env [ 428.637812] kobject: 'veth0_to_bond' (0000000079121fac): kobject_uevent_env [ 428.643404] kobject: 'tunl0' (000000007239357a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 428.643412] kobject: 'tunl0' (000000007239357a): calling ktype release [ 428.643431] kobject: 'tunl0': free name [ 428.671404] kobject: 'veth0_to_bond' (0000000079121fac): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bond' [ 428.682194] kobject: 'queues' (000000004137f6cb): kobject_add_internal: parent: 'veth0_to_bond', set: '' [ 428.692364] kobject: 'queues' (000000004137f6cb): kobject_uevent_env [ 428.698841] kobject: 'queues' (000000004137f6cb): kobject_uevent_env: filter function caused the event to drop! [ 428.709128] kobject: 'rx-0' (0000000066d03917): kobject_add_internal: parent: 'queues', set: 'queues' [ 428.718760] kobject: 'rx-0' (0000000066d03917): kobject_uevent_env [ 428.725155] kobject: 'rx-0' (0000000066d03917): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bond/queues/rx-0' [ 428.736218] kobject: 'tx-0' (0000000087621473): kobject_add_internal: parent: 'queues', set: 'queues' [ 428.745761] kobject: 'tx-0' (0000000087621473): kobject_uevent_env [ 428.752127] kobject: 'tx-0' (0000000087621473): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bond/queues/tx-0' [ 428.763795] kobject: 'bond_slave_0' (0000000047cbf1f8): kobject_add_internal: parent: 'net', set: 'devices' [ 428.774148] kobject: 'bond_slave_0' (0000000047cbf1f8): kobject_uevent_env [ 428.781399] kobject: 'bond_slave_0' (0000000047cbf1f8): fill_kobj_path: path = '/devices/virtual/net/bond_slave_0' [ 428.792009] kobject: 'queues' (000000005ec6dc3c): kobject_add_internal: parent: 'bond_slave_0', set: '' [ 428.802132] kobject: 'queues' (000000005ec6dc3c): kobject_uevent_env [ 428.808620] kobject: 'queues' (000000005ec6dc3c): kobject_uevent_env: filter function caused the event to drop! [ 428.818898] kobject: 'rx-0' (000000002993cb11): kobject_add_internal: parent: 'queues', set: 'queues' [ 428.828318] kobject: 'rx-0' (000000002993cb11): kobject_uevent_env [ 428.834695] kobject: 'rx-0' (000000002993cb11): fill_kobj_path: path = '/devices/virtual/net/bond_slave_0/queues/rx-0' [ 428.845835] kobject: 'tx-0' (00000000da464782): kobject_add_internal: parent: 'queues', set: 'queues' [ 428.855393] kobject: 'tx-0' (00000000da464782): kobject_uevent_env [ 428.861758] kobject: 'tx-0' (00000000da464782): fill_kobj_path: path = '/devices/virtual/net/bond_slave_0/queues/tx-0' [ 428.874593] kobject: 'tunl0' (000000002962306e): kobject_cleanup, parent (null) [ 428.883642] kobject: 'tunl0' (000000002962306e): auto cleanup 'remove' event [ 428.892563] kobject: 'tunl0' (000000002962306e): kobject_uevent_env [ 428.899214] kobject: 'tunl0' (000000002962306e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 428.903815] kobject: 'veth1_to_bond' (000000004ab77d32): kobject_add_internal: parent: 'net', set: 'devices' [ 428.909763] kobject: 'tunl0' (000000002962306e): calling ktype release [ 428.920407] kobject: 'veth1_to_bond' (000000004ab77d32): kobject_uevent_env [ 428.926348] kobject: 'tunl0': free name [ 428.933193] kobject: 'veth1_to_bond' (000000004ab77d32): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bond' [ 428.947885] kobject: 'queues' (00000000c4d5694b): kobject_add_internal: parent: 'veth1_to_bond', set: '' [ 428.958088] kobject: 'queues' (00000000c4d5694b): kobject_uevent_env [ 428.964617] kobject: 'queues' (00000000c4d5694b): kobject_uevent_env: filter function caused the event to drop! [ 428.975185] kobject: 'rx-0' (000000009845a6db): kobject_add_internal: parent: 'queues', set: 'queues' [ 428.984651] kobject: 'rx-0' (000000009845a6db): kobject_uevent_env [ 428.990982] kobject: 'rx-0' (000000009845a6db): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bond/queues/rx-0' [ 429.002185] kobject: 'tx-0' (0000000033db43fc): kobject_add_internal: parent: 'queues', set: 'queues' [ 429.011766] kobject: 'tx-0' (0000000033db43fc): kobject_uevent_env [ 429.018086] kobject: 'tx-0' (0000000033db43fc): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bond/queues/tx-0' [ 429.029758] kobject: 'bond_slave_1' (0000000002f0fa43): kobject_add_internal: parent: 'net', set: 'devices' [ 429.040137] kobject: 'bond_slave_1' (0000000002f0fa43): kobject_uevent_env [ 429.047195] kobject: 'bond_slave_1' (0000000002f0fa43): fill_kobj_path: path = '/devices/virtual/net/bond_slave_1' [ 429.057753] kobject: 'queues' (0000000036492bd4): kobject_add_internal: parent: 'bond_slave_1', set: '' [ 429.067843] kobject: 'queues' (0000000036492bd4): kobject_uevent_env [ 429.074362] kobject: 'queues' (0000000036492bd4): kobject_uevent_env: filter function caused the event to drop! [ 429.084629] kobject: 'rx-0' (0000000081225b31): kobject_add_internal: parent: 'queues', set: 'queues' [ 429.094069] kobject: 'rx-0' (0000000081225b31): kobject_uevent_env [ 429.100408] kobject: 'rx-0' (0000000081225b31): fill_kobj_path: path = '/devices/virtual/net/bond_slave_1/queues/rx-0' [ 429.111611] kobject: 'tx-0' (00000000c83c6999): kobject_add_internal: parent: 'queues', set: 'queues' [ 429.121133] kobject: 'tx-0' (00000000c83c6999): kobject_uevent_env [ 429.127460] kobject: 'tx-0' (00000000c83c6999): fill_kobj_path: path = '/devices/virtual/net/bond_slave_1/queues/tx-0' [ 429.139949] kobject: 'rx-0' (00000000c725ef2a): kobject_cleanup, parent 00000000b3b89e30 [ 429.148308] kobject: 'rx-0' (00000000c725ef2a): auto cleanup 'remove' event [ 429.155669] kobject: 'rx-0' (00000000c725ef2a): kobject_uevent_env [ 429.162276] kobject: 'rx-0' (00000000c725ef2a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 429.172604] kobject: 'rx-0' (00000000c725ef2a): auto cleanup kobject_del [ 429.179461] kobject: 'rx-0' (00000000c725ef2a): calling ktype release [ 429.186093] kobject: 'rx-0': free name [ 429.190018] kobject: 'tx-0' (00000000090b4b9a): kobject_cleanup, parent 00000000b3b89e30 [ 429.198288] kobject: 'tx-0' (00000000090b4b9a): auto cleanup 'remove' event [ 429.205430] kobject: 'tx-0' (00000000090b4b9a): kobject_uevent_env [ 429.211776] kobject: 'tx-0' (00000000090b4b9a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 429.221872] kobject: 'tx-0' (00000000090b4b9a): auto cleanup kobject_del [ 429.228719] kobject: 'tx-0' (00000000090b4b9a): calling ktype release [ 429.235320] kobject: 'tx-0': free name [ 429.239223] kobject: 'queues' (00000000b3b89e30): kobject_cleanup, parent (null) [ 429.247685] kobject: 'queues' (00000000b3b89e30): calling ktype release [ 429.254457] kobject: 'queues' (00000000b3b89e30): kset_release [ 429.260411] kobject: 'queues': free name [ 429.264810] kobject: 'lo' (000000004724bac1): kobject_uevent_env [ 429.270943] kobject: 'lo' (000000004724bac1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 429.281684] kobject: 'rx-0' (000000008e4b6d73): kobject_cleanup, parent 0000000069a1a8d7 [ 429.289902] kobject: 'rx-0' (000000008e4b6d73): auto cleanup 'remove' event [ 429.297031] kobject: 'rx-0' (000000008e4b6d73): kobject_uevent_env [ 429.303411] kobject: 'rx-0' (000000008e4b6d73): kobject_uevent_env: uevent_suppress caused the event to drop! [ 429.313506] kobject: 'rx-0' (000000008e4b6d73): auto cleanup kobject_del [ 429.320377] kobject: 'rx-0' (000000008e4b6d73): calling ktype release [ 429.327207] kobject: 'rx-0': free name [ 429.331202] kobject: 'tx-0' (0000000057fadee3): kobject_cleanup, parent 0000000069a1a8d7 [ 429.339428] kobject: 'tx-0' (0000000057fadee3): auto cleanup 'remove' event [ 429.346615] kobject: 'tx-0' (0000000057fadee3): kobject_uevent_env [ 429.352953] kobject: 'tx-0' (0000000057fadee3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 429.363055] kobject: 'tx-0' (0000000057fadee3): auto cleanup kobject_del [ 429.369919] kobject: 'tx-0' (0000000057fadee3): calling ktype release [ 429.376524] kobject: 'tx-0': free name [ 429.380428] kobject: 'queues' (0000000069a1a8d7): kobject_cleanup, parent (null) [ 429.388892] kobject: 'queues' (0000000069a1a8d7): calling ktype release [ 429.395658] kobject: 'queues' (0000000069a1a8d7): kset_release [ 429.401702] kobject: 'queues': free name [ 429.405967] kobject: 'lo' (00000000ae21796a): kobject_uevent_env [ 429.412176] kobject: 'lo' (00000000ae21796a): kobject_uevent_env: uevent_suppress caused the event to drop!